Table of contents for issues of IEEE\slash ACM Transactions on Networking

Last update: Wed May 17 13:39:50 MDT 2023                Valid HTML 3.2!

Volume 1, Number 1, February, 1993
Volume 1, Number 2, April, 1993
Volume 1, Number 3, June, 1993
Volume 1, Number 4, August, 1993
Volume 1, Number 5, October, 1993
Volume 1, Number 6, December, 1993
Volume 2, Number 1, February, 1994
Volume 2, Number 2, April, 1994
Volume 2, Number 3, June, 1994
Volume 2, Number 4, August, 1994
Volume 2, Number 5, October, 1994
Volume 2, Number 6, December, 1994
Volume 3, Number 1, February, 1995
Volume 3, Number 2, April, 1995
Volume 3, Number 3, June, 1995
Volume 3, Number 4, August, 1995
Volume 3, Number 5, October, 1995
Volume 3, Number 6, December, 1995
Volume 4, Number 1, February, 1996
Volume 4, Number 2, April, 1996
Volume 4, Number 3, June, 1996
Volume 4, Number 4, August, 1996
Volume 4, Number 5, October, 1996
Volume 4, Number 6, December, 1996
Volume 5, Number 1, February, 1997
Volume 5, Number 2, April, 1997
Volume 5, Number 3, June, 1997
Volume 5, Number 4, August, 1997
Volume 5, Number 5, October, 1997
Volume 5, Number 6, December, 1997
Volume 6, Number 1, February, 1998
Volume 6, Number 2, April, 1998
Volume 6, Number 3, June, 1998
Volume 6, Number 4, August, 1998
Volume 6, Number 5, October, 1998
Volume 6, Number 6, December, 1998
Volume 7, Number 1, February, 1999
Volume 7, Number 2, April, 1999
Volume 7, Number 3, June, 1999
Volume 7, Number 4, August, 1999
Volume 7, Number 5, October, 1999
Volume 7, Number 6, December, 1999
Volume 8, Number 1, February, 2000
Volume 8, Number 2, 2000
Volume 8, Number 3, 2000
Volume 8, Number 4, 2000
Volume 8, Number 5, 2000
Volume 8, Number 6, 2000
Volume 9, Number 1, 2001
Volume 9, Number 2, 2001
Volume 9, Number 3, June, 2001
Volume 9, Number 4, August, 2001
Volume 9, Number 5, October, 2001
Volume 9, Number 6, December, 2001
Volume 10, Number 1, February, 2002
Volume 10, Number 2, April, 2002
Volume 10, Number 3, June, 2002
Volume 10, Number 4, August, 2002
Volume 10, Number 5, October, 2002
Volume 10, Number 6, December, 2002
Volume 11, Number 1, February, 2003
Volume 11, Number 2, April, 2003
Volume 11, Number 3, June, 2003
Volume 11, Number 4, August, 2003
Volume 11, Number 5, October, 2003
Volume 11, Number 6, December, 2003
Volume 12, Number 1, February, 2004
Volume 12, Number 2, April, 2004
Volume 12, Number 3, June, 2004
Volume 12, Number 4, August, 2004
Volume 12, Number 5, October, 2004
Volume 12, Number 6, December, 2004
Volume 13, Number 1, February, 2005
Volume 13, Number 2, April, 2005
Volume 13, Number 3, June, 2005
Volume 13, Number 4, August, 2005
Volume 13, Number 5, October, 2005
Volume 13, Number 6, December, 2005
Volume 14, Number 1, February, 2006
Volume 14, Number 2, April, 2006
Volume 14, Number 3, 2006
Volume 14, Number SI, June, 2006
Volume 14, Number 4, August, 2006
Volume 14, Number 5, October, 2006
Volume 14, Number 6, December, 2006
Volume 15, Number 1, February, 2007
Volume 15, Number 2, April, 2007
Volume 15, Number 3, June, 2007
Volume 15, Number 4, August, 2007
Volume 15, Number 5, October, 2007
Volume 15, Number 6, December, 2007
Volume 16, Number 1, February, 2008
Volume 16, Number 2, April, 2008
Volume 16, Number 3, June, 2008
Volume 16, Number 4, August, 2008
Volume 16, Number 5, October, 2008
Volume 16, Number 6, December, 2008
Volume 17, Number 1, February, 2009
Volume 17, Number 2, April, 2009
Volume 17, Number 3, June, 2009
Volume 17, Number 4, August, 2009
Volume 17, Number 5, October, 2009
Volume 17, Number 6, December, 2009
Volume 18, Number 1, February, 2010
Volume 18, Number 2, April, 2010
Volume 18, Number 3, June, 2010
Volume 18, Number 4, August, 2010
Volume 18, Number 5, October, 2010
Volume 18, Number 6, December, 2010
Volume 19, Number 1, February, 2011
Volume 19, Number 2, April, 2011
Volume 19, Number 3, June, 2011
Volume 19, Number 4, August, 2011
Volume 19, Number 5, October, 2011
Volume 19, Number 6, December, 2011
Volume 20, Number 1, February, 2012
Volume 20, Number 2, April, 2012
Volume 20, Number 3, June, 2012
Volume 20, Number 4, August, 2012
Volume 20, Number 5, October, 2012
Volume 20, Number 6, December, 2012
Volume 21, Number 1, February, 2013
Volume 21, Number 2, April, 2013
Volume 21, Number 3, June, 2013
Volume 21, Number 4, August, 2013
Volume 21, Number 5, October, 2013
Volume 21, Number 6, December, 2013
Volume 22, Number 1, February, 2014
Volume 22, Number 2, April, 2014
Volume 22, Number 3, June, 2014
Volume 22, Number 4, August, 2014
Volume 22, Number 5, October, 2014
Volume 22, Number 6, December, 2014
Volume 23, Number 1, February, 2015
Volume 23, Number 2, April, 2015
Volume 23, Number 3, June, 2015
Volume 23, Number 4, August, 2015
Volume 23, Number 5, October, 2015
Volume 24, Number 1, February, 2016
Volume 24, Number 2, April, 2016
Volume 24, Number 3, June, 2016
Volume 24, Number 4, August, 2016
Volume 24, Number 5, October, 2016
Volume 24, Number 6, December, 2016
Volume 25, Number 1, February, 2017
Volume 25, Number 2, April, 2017
Volume 25, Number 3, June, 2017
Volume 25, Number 4, August, 2017
Volume 25, Number 5, October, 2017
Volume 25, Number 6, December, 2017
Volume 26, Number 1, February, 2018
Volume 26, Number 2, April, 2018
Volume 26, Number 3, June, 2018
Volume 26, Number 4, August, 2018
Volume 26, Number 5, October, 2018
Volume 26, Number 6, December, 2018
Volume 27, Number 1, February, 2019
Volume 27, Number 2, April, 2019
Volume 27, Number 3, June, 2019
Volume 27, Number 4, August, 2019
Volume 27, Number 5, October, 2019
Volume 27, Number 6, December, 2019
Volume 28, Number 1, February, 2020
Volume 28, Number 2, April, 2020
Volume 28, Number 3, June, 2020
Volume 28, Number 4, August, 2020
Volume 28, Number 5, October, 2020
Volume 28, Number 6, December, 2020
Volume 29, Number 1, February, 2021
Volume 29, Number 2, April, 2021
Volume 29, Number 3, June, 2021
Volume 29, Number 4, August, 2021
Volume 29, Number 5, October, 2021
Volume 29, Number 6, December, 2021
Volume 30, Number 1, February, 2022
Volume 30, Number 2, April, 2022
Volume 30, Number 3, June, 2022
Volume 30, Number 4, 2022
Volume 30, Number 5, 2022
Volume 30, Number 6, 2022
Volume 31, Number 1, 2023


IEEE\slash ACM Transactions on Networking
Volume 1, Number 1, February, 1993

             Mark B. Abbott and   
              Larry L. Peterson   A language-based approach to protocol
                                  implementation . . . . . . . . . . . . . 4--19
           P. Venkat Rangan and   
             Harrick M. Vin and   
            Srinivas Ramanathan   Communication architectures and
                                  algorithms for media mixing in
                                  multimedia conferences . . . . . . . . . 20--30
               V. Ramaswami and   
               Jonathan L. Wang   Analysis of the link error monitoring
                                  protocols in the common channel
                                  signaling network  . . . . . . . . . . . 31--47
                 Clark Wang and   
                Mischa Schwartz   Fault detection with multiple observers  48--55
             Deborah Estrin and   
          Martha Steenstrup and   
                    Gene Tsudik   A protocol for route establishment and
                                  packet forwarding across multidomain
                                  Internets  . . . . . . . . . . . . . . . 56--70
            Mark W. Garrett and   
                Martin Vetterli   Joint source/channel coding of
                                  statistically multiplexed real-time
                                  services on packet networks  . . . . . . 71--80
             Pierre Humblet and   
              Amit Bhargava and   
             Michael G. Hluchyj   Ballot theorems applied to the transient
                                  analysis of nD/D/1 queues  . . . . . . . 81--95
                Oran Sharon and   
                  Adrian Segall   A simple scheme for slot reuse without
                                  latency for a dual bus configuration . . 96--104
            Shun-Ping Chung and   
               Arik Kashper and   
                  Keith W. Ross   Computing approximate blocking
                                  probabilities for large loss networks
                                  with state-dependent routing . . . . . . 105--115
          Raymond E. Miller and   
                    Sanjoy Paul   On the generation of minimal-length
                                  conformance tests for communication
                                  protocols  . . . . . . . . . . . . . . . 116--129
      J. J. Garcia-Lunes-Aceves   Loop-free routing using diffusing
                                  computations . . . . . . . . . . . . . . 130--141
              David X. Chen and   
                    Jon W. Mark   SCOQ: a fast packet switch with shared
                                  concentration and output queueing  . . . 142--151

IEEE\slash ACM Transactions on Networking
Volume 1, Number 2, April, 1993

               Wen De Zhong and   
             Jaidev Kaniyil and   
                     Y. Onozato   A copy network with shared buffers for
                                  large-scale multicast ATM switching  . . 157--165
     Subramanian Ramanathan and   
                 Errol L. Lloyd   Scheduling algorithms for multihop radio
                                  networks . . . . . . . . . . . . . . . . 166--177
         C. Murray Woodside and   
                 R. Greg Franks   Alternative software architectures for
                                  parallel protocol execution with
                                  synchronous IPC  . . . . . . . . . . . . 178--186
                 Ariel Orda and   
                Raphael Rom and   
                     Moshe Sidi   Minimum delay routing in stochastic
                                  networks . . . . . . . . . . . . . . . . 187--198
      Christos Papadopoulos and   
          Gurudatta M. Parulkar   Experimental evaluation of SUNOS IPC and
                                  TCP/IP protocol implementation . . . . . 199--216
           David M. Kristol and   
                  David Lee and   
          Arun N. Netravali and   
                Krishan Sabnani   A polynomial algorithm for gateway
                                  generation from formal specifications    217--229
               Qinglin Wang and   
                Victor S. Frost   Efficient estimation of cell blocking
                                  probability for ATM systems  . . . . . . 230--235
               Kin K. Leung and   
           Raymond W. Yeung and   
               Bhaskar Sengupta   A credit manager for traffic regulation
                                  in high-speed networks: a queueing
                                  analysis . . . . . . . . . . . . . . . . 236--245
        Srinivas Ramanathan and   
               P. Venkat Rangan   Adaptive feedback techniques for
                                  synchronized multimedia retrieval over
                                  integrated networks  . . . . . . . . . . 246--260
         Richard J. Gibbens and   
             Frank P. Kelly and   
           Stephen R. E. Turner   Dynamic routing in multiparented
                                  networks . . . . . . . . . . . . . . . . 261--270

IEEE\slash ACM Transactions on Networking
Volume 1, Number 3, June, 1993

             Mehran Bagheri and   
             Dennis T. Kong and   
            Wayne S. Holden and   
       Fernando C. Irizarry and   
               Derek D. Mahoney   An STS-N byte-interleaving
                                  multiplexer/scrambler and
                                  demultiplexer/descrambler architecture
                                  and its experimental OC-48
                                  implementation . . . . . . . . . . . . . 282--285
    Vachaspathi P. Kompella and   
         Joseph C. Pasquale and   
              George C. Polyzos   Multicast routing for multimedia
                                  communication  . . . . . . . . . . . . . 286--292
      Michael Devetsikiotis and   
              J. Keith Townsend   Statistical optimization of dynamic
                                  importance sampling parameters for
                                  efficient simulation of communication
                                  networks . . . . . . . . . . . . . . . . 293--305
               Ilan Kessler and   
                 Arvind Krishna   On the cost of fairness in ring networks 306--313
          Achille Pattavina and   
                 Giacomo Bruzzi   Analysis of input and output queueing
                                  for nonblocking ATM switches . . . . . . 314--328
           Anwar I. Elwalid and   
                  Debasis Mitra   Effective bandwidth of general Markovian
                                  traffic sources and admission control of
                                  high speed networks  . . . . . . . . . . 329--343
            Abhay K. Parekh and   
             Robert G. Gallager   A generalized processor sharing approach
                                  to flow control in integrated services
                                  networks: the single-node case . . . . . 344--357
                 Hasan Ural and   
                      Keqin Zhu   Optimal length test sequence generation
                                  using distinguishing sequences . . . . . 358--371
                Opher Yaron and   
                     Moshe Sidi   Performance and stability of
                                  communication networks via robust
                                  exponential bounds . . . . . . . . . . . 372--385
               Hosame Abu-Amara   A fast topology maintenance algorithm
                                  for high-bandwidth networks  . . . . . . 386--394

IEEE\slash ACM Transactions on Networking
Volume 1, Number 4, August, 1993

                Sally Floyd and   
                   Van Jacobson   Random early detection gateways for
                                  congestion avoidance . . . . . . . . . . 397--413
               Luping Liang and   
          Gerald W. Neufeld and   
              Samuel T. Chanson   A name model for nested group
                                  communication  . . . . . . . . . . . . . 414--423
             George Kesidis and   
               Jean Walrand and   
              Cheng-Shang Chang   Effective bandwidths for multiclass
                                  Markov fluids and other ATM sources  . . 424--428
            Craig Partridge and   
                   Stephen Pink   A faster UDP . . . . . . . . . . . . . . 429--440
           Gerard R. Pieris and   
                Galen H. Sasaki   A linear lightwave Benes network . . . . 441--445
                Paul Skelly and   
            Mischa Schwartz and   
                   Sudhir Dixit   A histogram-based model for video
                                  traffic behavior in an ATM multiplexer   446--459
        André Girard and   
                   Bernard Liau   Dimensioning of adaptively routed
                                  networks . . . . . . . . . . . . . . . . 460--468
               Israel Cidon and   
             Inder S. Gopal and   
                  Adrian Segall   Connection establishment in high-speed
                                  networks . . . . . . . . . . . . . . . . 469--481
           Giuseppe Bianchi and   
             Jonathan S. Turner   Improved queueing analysis of shared
                                  buffer switching networks  . . . . . . . 482--490
           Michael P. Rumsewicz   Analysis of the effects of SS7 message
                                  discard schemes on call completion rates
                                  during overload  . . . . . . . . . . . . 491--502

IEEE\slash ACM Transactions on Networking
Volume 1, Number 5, October, 1993

          Mohammad Ghanbari and   
              Charles J. Hughes   Packing coded video signals into ATM
                                  cells  . . . . . . . . . . . . . . . . . 505--509
                 Ariel Orda and   
                Raphael Rom and   
                  Nahum Shimkin   Competitive routing in multiuser
                                  communication networks . . . . . . . . . 510--521
                  San-qi Li and   
                 Chia-Lin Hwang   Queue response to input correlation
                                  functions: discrete spectral analysis    522--533
           M. Ajmone Marsan and   
              Andrea Bianco and   
            Emilio Leonardi and   
                     Fabio Neri   Topologies for wavelength-routing
                                  all-optical networks . . . . . . . . . . 534--546
              Steven H. Low and   
              Pravin P. Varaiya   A new approach to service provisioning
                                  in ATM networks  . . . . . . . . . . . . 547--553
   Chandramohan A. Thekkath and   
              Thu D. Nguyen and   
                 Evelyn Moy and   
             Edward D. Lazowska   Implementing network protocols at user
                                  level  . . . . . . . . . . . . . . . . . 554--565
                Paolo Coppo and   
          Matteo D'Ambrosio and   
                 Riccardo Melen   Optimal cost/performance design of ATM
                                  switches . . . . . . . . . . . . . . . . 566--575
             Randall Landry and   
            Ioannis Stavrakakis   Queueing study of a $3$-priority policy
                                  with distinct service strategies . . . . 576--589
         Deepinder P. Sidhu and   
            Howard Motteler and   
             Raghu Vallurupalli   On testing hierarchies for protocols . . 590--599
             Mark B. Abbott and   
              Larry L. Peterson   Increasing network throughput by
                                  integrating protocol layers  . . . . . . 600--610

IEEE\slash ACM Transactions on Networking
Volume 1, Number 6, December, 1993

                 Ron Cocchi and   
              Scott Shenker and   
             Deborah Estrin and   
                    Lixia Zhang   Pricing in computer networks:
                                  motivation, formulation, and example . . 614--627
            Andrea Baiocchi and   
  Nicola Bléfari-Melazzi   An error-controlled approximate analysis
                                  of a stochastic fluid flow model applied
                                  to an ATM multiplexer with heterogeneous
                                  On-Off sources . . . . . . . . . . . . . 628--637
                  Xing Chen and   
              Jeremiah F. Hayes   Access control in multicast packet
                                  switching  . . . . . . . . . . . . . . . 638--649
          Matthias Kaiserswerth   The Parallel Protocol Engine . . . . . . 650--663
          Erik A. van Doorn and   
             Frans J. M. Panken   Blocking probabilities in a loss system
                                  with arrivals in geometrically
                                  distributed batches and heterogeneous
                                  service requirements . . . . . . . . . . 664--667
                       Limin Hu   Distributed code assignments for CDMA
                                  Packet Radio Network . . . . . . . . . . 668--677
                  San-qi Li and   
                 Chia-Lin Hwang   Queue response to input correlation
                                  functions: continuous spectral analysis  678--692
           Lotfi Benmohamed and   
              Semyon M. Meerkov   Feedback control of congestion in packet
                                  switching networks: the case of a single
                                  congested node . . . . . . . . . . . . . 693--708
              Duan-Shin Lee and   
               Bhaskar Sengupta   Queueing analysis of a threshold based
                                  priority scheme for ATM networks . . . . 709--717
        Leonidas Georgiadis and   
         Roch Guérin and   
                   Israel Cidon   Throughput properties of fair policies
                                  in ring networks . . . . . . . . . . . . 718--728
                Frank Y. S. Lin   Link set sizing for networks supporting
                                  SMDS . . . . . . . . . . . . . . . . . . 729--739
         Thomas F. La Porta and   
                Mischa Schwartz   Performance analysis of MSP:
                                  feature-rich high-speed transport
                                  protocol . . . . . . . . . . . . . . . . 740--753


IEEE\slash ACM Transactions on Networking
Volume 2, Number 1, February, 1994

             Will E. Leland and   
             Murad S. Taqqu and   
           Walter Willinger and   
               Daniel V. Wilson   On the self-similar nature of Ethernet
                                  traffic (extended version) . . . . . . . 1--15
                  A. J. McAuley   Weighted sum codes for error detection
                                  and their comparison with existing codes 16--22
            Imrich Chlamtac and   
    András Faragó   Making transmission schedules immune to
                                  topology changes in multi-hop packet
                                  radio networks . . . . . . . . . . . . . 23--29
               Zsehong Tsai and   
               Wen-der Wang and   
            Chien-Hwa Chiou and   
               Jin-Fu Chang and   
                Lung-Sing Liang   Performance analysis of two echo control
                                  designs in ATM networks  . . . . . . . . 30--39
                    Tsong-Ho Wu   A passive protected self-healing mesh
                                  network architecture and applications    40--52
             Hong-Dah Sheng and   
                      San-Qi Li   Spectral analysis of packet loss rate at
                                  a statistical multiplexer for multimedia
                                  services . . . . . . . . . . . . . . . . 53--65
                 Gerard Tel and   
             Ephraim Korach and   
                    Shmuel Zaks   Synchronizing ABD networks . . . . . . . 66--69
         Kumar N. Sivarajan and   
                Rajiv Ramaswami   Lightwave networks based on de Bruijn
                                  graphs . . . . . . . . . . . . . . . . . 70--79
            Jane M. Simmons and   
             Robert G. Gallager   Design of error detection scheme for
                                  class C service in ATM . . . . . . . . . 80--88
                Oran Sharon and   
                  Adrian Segall   On the efficiency of slot reuse in the
                                  Dual Bus configuration . . . . . . . . . 89--100

IEEE\slash ACM Transactions on Networking
Volume 2, Number 2, April, 1994

           Gerard R. Pieris and   
                Galen H. Sasaki   Scheduling transmissions in WDM
                                  broadcast-and-select networks  . . . . . 105--110
              Julio Escobar and   
            Craig Partridge and   
                  Debra Deutsch   Flow synchronization protocol  . . . . . 111--121
                Sally Floyd and   
                   Van Jacobson   The synchronization of periodic routing
                                  messages . . . . . . . . . . . . . . . . 122--136
            Abhay K. Parekh and   
            Robert G. Gallagher   A generalized processor sharing approach
                                  to flow control in integrated services
                                  networks: the multiple node case . . . . 137--150
        Marco Ajmone Marsan and   
              Andrea Bianco and   
            Luigi Ciminiera and   
             Riccardo Sisto and   
              Adriano Valenzano   A LOTOS extension for the performance
                                  analysis of distributed systems  . . . . 151--165
             Chung-Ju Chang and   
              Tian-Tsair Su and   
              Yueh-Yiing Chiang   Analysis of a cutoff priority cellular
                                  radio system with finite queueing and
                                  reneging/dropping  . . . . . . . . . . . 166--175
         David M. Lucantoni and   
            Marcel F. Neuts and   
                 Amy R. Reibman   Methods for performance evaluation of
                                  VBR video traffic models . . . . . . . . 176--180
         Daniel S. Omundsen and   
              A. Roger Kaye and   
                Samy A. Mahmoud   A pipelined, multiprocessor architecture
                                  for a connectionless server for
                                  broadband ISDN . . . . . . . . . . . . . 181--192
             George W. Hart and   
               Samir G. Kelekar   Automated repair of complex systems by
                                  fault compensation . . . . . . . . . . . 193--205
                  Seung Ho Hong   Approximate analysis of timer-controlled
                                  priority scheme in the single-service
                                  token-passing systems  . . . . . . . . . 206--215

IEEE\slash ACM Transactions on Networking
Volume 2, Number 3, June, 1994

                  Aura Ganz and   
                    Xudong Wang   Efficient algorithm for virtual topology
                                  design in multihop lightwave networks    217--225
                Inder Gopal and   
             Roch Guérin   Network transparency: the plaNET
                                  approach . . . . . . . . . . . . . . . . 226--239
               Israel Cidon and   
         Roch Guérin and   
                   Asad Khamisy   On protective buffer policies  . . . . . 240--246
            Piera Barcaccia and   
         Maurizio A. Bonuccelli   Polynomial time optimal algorithms for
                                  time slot assignment of variable
                                  bandwidth systems  . . . . . . . . . . . 247--251
   Dragomir D. Dimitrijevic and   
             Basil Maglaris and   
             Robert R. Boorstyn   Routing in multidomain networks  . . . . 252--262
                   Reuven Cohen   ``Session swapping'': a new approach for
                                  optimal bandwidth sharing of ring
                                  circuit switched channels  . . . . . . . 263--268
                Oran Sharon and   
                  Adrian Segall   Schemes for slot reuse in CRMA . . . . . 269--278
                Terence D. Todd   The token grid network . . . . . . . . . 279--287
                Jae W. Byun and   
                    Tony T. Lee   The design and analysis of an ATM
                                  multicast switch with adaptive traffic
                                  controller . . . . . . . . . . . . . . . 288--298
    Emmanouel A. Varvarigos and   
           Dimitri P. Bertsekas   Performance of hypercube routing schemes
                                  with or without buffering  . . . . . . . 299--311

IEEE\slash ACM Transactions on Networking
Volume 2, Number 4, August, 1994

                    Vern Paxson   Empirically derived analytic models of
                                  wide-area TCP connections  . . . . . . . 316--336
                   Allen R. and   
                J. r. Bonde and   
                    Sumit Ghosh   A comparative study of fuzzy versus
                                  ``fixed'' thresholds for robust queue
                                  management in cell-switching networks    337--344
               Philip P. To and   
           Tak-Shing P. Yum and   
                 Yiu-Wing Leung   Multistar implementation of expandable
                                  shufflenets  . . . . . . . . . . . . . . 345--351
         Martina Zitterbart and   
           Ahmed N. Tantawy and   
          Dimitrios N. Serpanos   A high performance transparent bridge    352--362
                Jon M. Peha and   
                Fouad A. Tobagi   Analyzing the fault tolerance of
                                  double-loop networks . . . . . . . . . . 363--373
         Leandros Tassiulas and   
             Yao Chung Hung and   
            Shivendra S. Panwar   Optimal buffer control during congestion
                                  in an ATM network node . . . . . . . . . 374--386
        Catherine Rosenberg and   
               Bruno Laguë   A heuristic framework for source
                                  policing in ATM networks . . . . . . . . 387--397
           Stefano Gianatti and   
              Achille Pattavina   Performance analysis of ATM Banyan
                                  networks with shared queueing --- part
                                  I: random offered traffic  . . . . . . . 398--410
          Achille Pattavina and   
               Stefano Gianatti   Performance analysis of ATM Banyan
                                  networks with shared queueing --- part
                                  II: correlated/unbalanced offered
                                  traffic  . . . . . . . . . . . . . . . . 411--424

IEEE\slash ACM Transactions on Networking
Volume 2, Number 5, October, 1994

        Michael F. Schwartz and   
                      Calton Pu   Applying an information gathering
                                  architecture to Netfind: a white pages
                                  tool for a changing and growing Internet 426--439
               Paul D. Amer and   
         Christophe Chassot and   
         Thomas J. Connolly and   
                Michel Diaz and   
                 Phillip Conrad   Partial-order transport service for
                                  multimedia and other applications  . . . 440--456
          Raymond E. Miller and   
                    Sanjoy Paul   Structural analysis of protocol
                                  specifications and generation of maximal
                                  fault coverage conformance test
                                  sequences  . . . . . . . . . . . . . . . 457--470
         Richard O. LaMaire and   
          Dimitrios N. Serpanos   Two-dimensional round-robin schedulers
                                  for packet switches with multiple input
                                  queues . . . . . . . . . . . . . . . . . 471--482
           Gilbert M. Lundy and   
               H. Alphan Tipici   Specification and analysis of the SNR
                                  high-speed transport protocol  . . . . . 483--496
             Tsern-Huei Lee and   
                   Jin-Jye Chou   Diagnosis of single faults in bitonic
                                  sorters  . . . . . . . . . . . . . . . . 497--507
          Mohamed Abdelaziz and   
            Ioannis Stavrakakis   Some optimal traffic regulation schemes
                                  for ATM networks: a Markov decision
                                  approach . . . . . . . . . . . . . . . . 508--519
        Dimitris Logothetis and   
              Kishor S. Trivedi   Reliability analysis of the double
                                  counter-rotating ring with concentrator
                                  attachments  . . . . . . . . . . . . . . 520--532
           James V. Luciani and   
               C. Y. Roger Chen   An analytical model for partially
                                  blocking finite-buffered switching
                                  networks . . . . . . . . . . . . . . . . 533--540
               Reuven Cohen and   
                     Yoram Ofek   Self-termination mechanism for label
                                  swapping routing . . . . . . . . . . . . 541--545

IEEE\slash ACM Transactions on Networking
Volume 2, Number 6, December, 1994

             Yiu-Wing Leung and   
                  Tak-Shing Yum   A modular multirate video distribution
                                  system: design and dimensioning  . . . . 549--557
              Debasis Mitra and   
               John A. Morrison   Erlang capacity and uniform
                                  approximations for shared unbuffered
                                  resources  . . . . . . . . . . . . . . . 558--570
                   Hyong S. Kim   Design and performance of Multinet
                                  switch: a multistage ATM switch
                                  architecture with partially shared
                                  buffers  . . . . . . . . . . . . . . . . 571--580
            Imrich Chlamtac and   
András Faragó and   
                      Tao Zhang   Optimizing the system of virtual paths   581--587
           Chun-Chong Huang and   
            Alberto Leon-Garcia   Separation principle of dynamic
                                  transmission and enqueueing priorities
                                  for real- and nonreal-time traffic in
                                  ATM multiplexers . . . . . . . . . . . . 588--601
                  Jacob Sharony   The universality of multidimensional
                                  switching networks . . . . . . . . . . . 602--612


IEEE\slash ACM Transactions on Networking
Volume 3, Number 1, February, 1995

       Michael P. Rumsewicz and   
                Donald E. Smith   A comparison of SS7 congestion control
                                  options during mass call-in situations   1--9
                  San-Qi Li and   
                 Song Chong and   
                 Chia-Lin Hwang   Link capacity allocation and network
                                  control by filtered input rate in
                                  high-speed networks  . . . . . . . . . . 10--25
              Wei-Tsong Lee and   
                 Ling-Yang Kung   Binary addressing and routing schemes in
                                  the Manhattan street network . . . . . . 26--30
                   Ray Bird and   
                Inder Gopal and   
              Amir Herzberg and   
                Phil Janson and   
                Shay Kutten and   
                Refik Molva and   
                      Moti Yung   The KryptoKnight family of light-weight
                                  protocols for authentication and key
                                  distribution . . . . . . . . . . . . . . 31--41
                   Judah Levine   An algorithm to synchronize the time of
                                  a computer to universal time . . . . . . 42--50
           Thomas Gutekunst and   
               Daniel Bauer and   
            Germano Caronni and   
          Bernhard Plattner and   
                          Hasan   A distributed and policy-free
                                  general-purpose shared window system . . 51--62
                 P. C. Wong and   
                    M. S. Yeung   Design and analysis of a novel fast
                                  packet switch: pipeline Banyan . . . . . 63--69
              Jeong Gyu Lee and   
                  Byeong Gi Lee   A new distribution network based on
                                  controlled switching elements and its
                                  applications . . . . . . . . . . . . . . 70--81
                   Zhen Liu and   
                    Don Towsley   Burst reduction properties of
                                  rate-control throttles: downstream queue
                                  behavior . . . . . . . . . . . . . . . . 82--90
           Christopher Ward and   
             Cheong H. Choi and   
                 Thomas F. Hain   A data link control protocol for LEO
                                  satellite networks providing a reliable
                                  datagram service . . . . . . . . . . . . 91--103

IEEE\slash ACM Transactions on Networking
Volume 3, Number 2, April, 1995

                    Paul Barker   An analysis of user input to an X.500
                                  white pages directory service  . . . . . 112--125
           H. Jonathan Chao and   
               Byeong-Seog Choe   Design and analysis of a large-scale
                                  multicast output buffered ATM switch . . 126--138
               Hyong W. Lee and   
                    Jon W. Mark   Capacity allocation in statistical
                                  multiplexing of ATM sources  . . . . . . 139--151
              Wen-Huei Chen and   
                     Hasan Ural   Synchronizable test sequences based on
                                  multiple UIO sequences . . . . . . . . . 152--157
            David A. Levine and   
                Ian F. Akyildiz   PROTON: a media access control protocol
                                  for optical networks with star topology  158--168
                 Yoram Ofek and   
                      Moti Yung   METANET: principles of an arbitrary
                                  topology LAN . . . . . . . . . . . . . . 169--180
                  P. S. Min and   
                   H. Saidi and   
                    M. V. Hegde   A nonblocking architecture for broadband
                                  multichannel switching . . . . . . . . . 181--198
               Myung J. Lee and   
                   David S. Ahn   Cell loss analysis and design trade-offs
                                  of nonblocking ATM switches with
                                  nonuniform traffic . . . . . . . . . . . 199--210
          George N. Rouskas and   
               Mostafa H. Ammar   Analysis and optimization of
                                  transmission schedules for single-hop
                                  WDM networks . . . . . . . . . . . . . . 211--221
                 Peter Farka\us   Comments on ``Weighted sum codes for
                                  error detection and their comparison
                                  with existing codes''  . . . . . . . . . 222--223

IEEE\slash ACM Transactions on Networking
Volume 3, Number 3, June, 1995

                Vern Paxson and   
                    Sally Floyd   Wide area traffic: the failure of
                                  Poisson modeling . . . . . . . . . . . . 226--244
                 David L. Mills   Improved algorithms for synchronizing
                                  computer network clocks  . . . . . . . . 245--254
           A. Udaya Shankar and   
                      David Lee   Minimum-latency transport protocols with
                                  modulo-$N$ . . . . . . . . . . . . . . . 255--268
           Rajesh K. Pankaj and   
             Robert G. Gallager   Wavelength requirements of all-optical
                                  networks . . . . . . . . . . . . . . . . 269--280
            Zhensheng Zhang and   
            Anthony S. Acampora   A heuristic wavelength assignment
                                  algorithm for multihop WDM networks with
                                  wavelength routing and wavelength re-use 281--288
                   H. Saidi and   
                  P. S. Min and   
                    M. V. Hegde   A new structural property of statistical
                                  data forks . . . . . . . . . . . . . . . 289--298
                 Xi-Ren Cao and   
                    Don Towsley   A performance model for ATM switches
                                  with general packet length distributions 299--309
                 David McMillan   Delay analysis of a cellular mobile
                                  priority queueing system . . . . . . . . 310--319
               Reuven Cohen and   
                 Yoram Ofek and   
                  Adrian Segall   A new label-based source routing for
                                  multi-ring networks  . . . . . . . . . . 320--328
             Amy R. Reibman and   
               Arthur W. Berger   Traffic descriptors for VBR video
                                  teleconferencing over ATM networks . . . 329--339
            Moncef Hamdaoui and   
        Parameswaran Ramanathan   Selection of timed token protocol
                                  parameters to guarantee message
                                  deadlines  . . . . . . . . . . . . . . . 340--351
               Chin-Tau Lea and   
                 Anwar Alyatama   Bandwidth quantization and states
                                  reduction in the broadband ISDN  . . . . 352--360

IEEE\slash ACM Transactions on Networking
Volume 3, Number 4, August, 1995

                Sally Floyd and   
                   Van Jacobson   Link-sharing and resource management
                                  models for packet networks . . . . . . . 365--386
             Ellen Witte Zegura   Evaluating blocking probability in
                                  generalized connectors . . . . . . . . . 387--398
        Norival R. Figueira and   
                Joseph Pasquale   An upper bound on delay for the
                                  VirtualClock service discipline  . . . . 399--408
          Kjersti Moldeklev and   
                Per Gunningberg   How a large ATM MTU causes deadlocks in
                                  TCP data transfers . . . . . . . . . . . 409--422
      Takis Konstantopoulos and   
              Venkat Anantharam   Optimal flow control schemes that
                                  regulate the burstiness of traffic . . . 423--432
             Guang-Liang Li and   
                Patrick W. Dowd   An analysis of network performance
                                  degradation induced by workload
                                  fluctuations . . . . . . . . . . . . . . 433--440
           Alan A. Bertossi and   
         Maurizio A. Bonuccelli   Code assignment for hidden terminal
                                  interference avoidance in multihop
                                  packet radio networks  . . . . . . . . . 441--449
             Kyeong Soo Kim and   
                  Byeong Gi Lee   Three-level traffic shaper and its
                                  application to source clock frequency
                                  recovery for VBR services in ATM
                                  networks . . . . . . . . . . . . . . . . 450--458
               Krishna Bala and   
            Thomas E. Stern and   
          David Simchi-Levi and   
                    Kavita Bala   Routing in a linear lightwave network    459--469
                Jason Iness and   
           Subrata Banerjee and   
            Biswanath Mukherjee   GEMNET: a generalized,
                                  shuffle-exchange-based, regular,
                                  scalable, modular, multihop, WDM
                                  lightwave network  . . . . . . . . . . . 470--476
                Feiling Jia and   
        Biswanath Mukherjee and   
                    Jason Iness   Scheduling variable-length messages in a
                                  single-hop multichannel local lightwave
                                  network  . . . . . . . . . . . . . . . . 477--488

IEEE\slash ACM Transactions on Networking
Volume 3, Number 5, October, 1995

            Rajiv Ramaswami and   
             Kumar N. Sivarajan   Routing and wavelength assignment in
                                  all-optical networks . . . . . . . . . . 489--500
                 Amit Gupta and   
               Domenico Ferrari   Resource partitioning for real-time
                                  communication  . . . . . . . . . . . . . 501--508
           Joseph Bannister and   
         Flaminio Borgonovo and   
               Luigi Fratta and   
                    Mario Gerla   A performance model of deflection
                                  routing in multibuffer networks with
                                  nonuniform traffic . . . . . . . . . . . 509--520
              Arif Merchant and   
               Bhaskar Sengupta   Assignment of cells to switches in PCS
                                  networks . . . . . . . . . . . . . . . . 521--526
           Krishnan Padmanabhan   An efficient architecture for
                                  fault-tolerant ATM switches  . . . . . . 527--537
                Donald E. Smith   Ensuring robust call throughput and
                                  fairness for SCP overload controls . . . 538--548
               Ming H. Chan and   
                John P. Princen   Prioritized statistical multiplexing of
                                  PCM sources  . . . . . . . . . . . . . . 549--559
  Edmundo de Souza e. Silva and   
            H. Richard Gail and   
               Richard R. Muntz   Polling systems with server timeouts and
                                  their application to token passing
                                  networks . . . . . . . . . . . . . . . . 560--575
         Leandros Tassiulas and   
                    Jinoo Joung   Performance measures and scheduling
                                  policies in ring networks  . . . . . . . 576--584
         Gagan L. Choudhury and   
               Kin K. Leung and   
                     Ward Whitt   An inversion algorithm to compute
                                  blocking probabilities in loss networks
                                  with state-dependent rates . . . . . . . 585--601
               Sem C. Borst and   
              Onno J. Boxma and   
                    Hanoch Levy   The use of service limits for efficient
                                  operation of multistation single-medium
                                  communication systems  . . . . . . . . . 602--612
             Whay Chiou Lee and   
              Pierre A. Humblet   Space-time characteristics of ALOHA
                                  protocols in high-speed bidirectional
                                  bus networks . . . . . . . . . . . . . . 613--622

IEEE\slash ACM Transactions on Networking
Volume 3, Number 6, December, 1995

             Ren-Hung Hwang and   
            James F. Kurose and   
                    Don Towsley   On-call processing delay in high speed
                                  networks . . . . . . . . . . . . . . . . 628--639
             David C. Feldmeier   Fast software implementation of error
                                  detection codes  . . . . . . . . . . . . 640--651
           H. Jonathan Chao and   
                    Necdet Uzun   An ATM queue manager handling multiple
                                  delay and loss priorities  . . . . . . . 652--659
               Guo-Liang Wu and   
                    Jon W. Mark   A buffer allocation scheme for ATM
                                  networks: complete sharing based on
                                  virtual partition  . . . . . . . . . . . 660--670
             Hemant Kanakia and   
           Partho P. Mishra and   
                 Amy R. Reibman   An adaptive congestion control scheme
                                  for real time packet video transport . . 671--682
            Geoffrey G. Xie and   
                   Simon S. Lam   Delay guarantee of virtual clock server  683--689
                 Jianxu Shi and   
                John P. Fonseka   Hierarchical self-healing rings  . . . . 690--697
            Upamanyu Madhow and   
           Michael L. Honig and   
              Kenneth Steiglitz   Optimization of wireless resources for
                                  personal communications mobility
                                  tracking . . . . . . . . . . . . . . . . 698--707
           C. Y. Roger Chen and   
           Shuo-Hsien Hsiao and   
          Abdulaziz S. Almazyad   A new model for the performance
                                  evaluation of synchronous circuit
                                  switched multistage interconnection
                                  networks . . . . . . . . . . . . . . . . 708--715
               Dipak Ghosal and   
             T. V. Lakshman and   
                   Yennun Huang   Parallel architectures for processing
                                  high speed network signaling protocols   716--728
               Sijing Zhang and   
                     Alan Burns   An optimal synchronous bandwidth
                                  allocation scheme for guaranteeing
                                  synchronous message deadlines with the
                                  timed-token MAC protocol . . . . . . . . 729--741
            Dong Guen Jeong and   
              Chong-Ho Choi and   
                  Wha Sook Jeon   Design and performance evaluation of a
                                  new medium access control protocol for
                                  local wireless data communications . . . 742--752
              Irene Katzela and   
                Mischa Schwartz   Schemes for fault identification in
                                  communication networks . . . . . . . . . 753--764
         Gregory P. Pollini and   
    Kathleen S. Meier-Hellstern   Efficient routing of information between
                                  interconnected cellular mobile switching
                                  centers  . . . . . . . . . . . . . . . . 765--774
              Meir Herzberg and   
             Stephen J. Bye and   
                  Anthony Utano   The hop-limit approach for
                                  spare-capacity assignment in survivable
                                  networks . . . . . . . . . . . . . . . . 775--784
               Ikhlaq Sidhu and   
                   Scott Jordan   Multiplexing gains in bit stream
                                  multiplexors . . . . . . . . . . . . . . 785--797
            Donald E. Smith and   
               H. Jonathan Chao   Sizing a packet reassembly buffer at a
                                  host computer in an ATM network  . . . . 798--808
                       D. Medhi   Multi-hour, multi-traffic class network
                                  design for virtual path-based
                                  dynamically reconfigurable wide-area ATM
                                  networks . . . . . . . . . . . . . . . . 809--818
               Scott J. Shenker   Making greed work in networks: a
                                  game-theoretic analysis of switch
                                  service disciplines  . . . . . . . . . . 819--831
          Matteo D'Ambrosio and   
                 Riccardo Melen   Evaluating the limit behavior of the ATM
                                  traffic within a network . . . . . . . . 832--841
                Izhak Rubin and   
           James Chien-Hsing Wu   Analysis of an M/G/1/N queue with
                                  vacations and its iterative application
                                  to FDDI timed-token rings  . . . . . . . 842--856
                Paul S. Min and   
         Manjunath V. Hegde and   
              Hossein Saidi and   
                   Alex Chandra   Nonblocking copy networks in
                                  multi-channel switching  . . . . . . . . 857--871
           C. Y. Roger Chen and   
         Georges A. Makhoul and   
          Dikran S. Meliksetian   A queueing analysis of the performance
                                  of DQDB  . . . . . . . . . . . . . . . . 872--881


IEEE\slash ACM Transactions on Networking
Volume 4, Number 1, February, 1996

            Anindo Banerjea and   
           Domenico Ferrari and   
               Bruce A. Mah and   
                 Mark Moran and   
            Dinesh C. Verma and   
                      Hui Zhang   The Tenet real-time protocol suite:
                                  design, implementation, and experiences  1--10
                 R. L. Cruz and   
                Jung-Tsung Tsai   COD: alternative architectures for high
                                  speed packet switching . . . . . . . . . 11--21
          Kazutaka Murakami and   
                   Hyong S. Kim   Virtual path routing for survivable ATM
                                  networks . . . . . . . . . . . . . . . . 22--39
           Daniel P. Heyman and   
                 T. V. Lakshman   Source models for VBR broadcast-video
                                  traffic  . . . . . . . . . . . . . . . . 40--48
               Anthony Hung and   
                 George Kesidis   Bandwidth scheduling for wide-area ATM
                                  networks using virtual finishing times   49--54
                Stefan Leue and   
           Philippe A. Oechslin   On parallelizing and optimizing the
                                  implementation of communication
                                  protocols  . . . . . . . . . . . . . . . 55--70
                 Dan Picker and   
          Ronald D. Fellman and   
                   Paul M. Chau   An extension to the SCI flow control
                                  protocol for increased network
                                  efficiency . . . . . . . . . . . . . . . 71--85
        Willibald Doeringer and   
        Günter Karjoth and   
                  Mehdi Nassehi   Routing on longest-matching prefixes . . 86--97
           Daniel Chonghwan Lee   Worst-case fraction of CBR teletraffic
                                  unpunctual due to statistical
                                  multiplexing . . . . . . . . . . . . . . 98--105
             David M. Koppelman   Congested Banyan network analysis using
                                  congested-queue states and
                                  neighboring-queue effects  . . . . . . . 106--111
                    Zvi Rosberg   Cell multiplexing in ATM networks  . . . 112--122
            Zbigniew Dziong and   
                 Lorne G. Mason   Fair-efficient call admission control
                                  policies for broadband networks --- a
                                  game theoretic framework . . . . . . . . 123--136

IEEE\slash ACM Transactions on Networking
Volume 4, Number 2, April, 1996

    Girish P. Chandranmenon and   
                George Varghese   Trading packet headers for packet
                                  processing . . . . . . . . . . . . . . . 141--152
            Stephen Deering and   
          Deborah L. Estrin and   
             Dino Farinacci and   
               Van Jacobson and   
             Ching-Gung Liu and   
                     Liming Wei   The PIM architecture for wide-area
                                  multicast routing  . . . . . . . . . . . 153--162
                  Hua Jiang and   
           Stephen S. Rappaport   Prioritized channel borrowing without
                                  locking: a channel sharing strategy for
                                  cellular communications  . . . . . . . . 163--172
       Panagiotis N. Zarros and   
               Myung J. Lee and   
               Tarek N. Saadawi   Interparticipant synchronization in
                                  real-time multimedia conferencing using
                                  feedback . . . . . . . . . . . . . . . . 173--180
                 Fred Bauer and   
                   Anujan Varma   Distributed algorithms for multicast
                                  path setup in data networks  . . . . . . 181--191
                   Hong Liu and   
              Raymond E. Miller   Generalized fair reachability analysis
                                  for cyclic protocols . . . . . . . . . . 192--204
         Leandros Tassiulas and   
            Leonidas Georgiadis   Any work-conserving policy stabilizes
                                  the ring with spatial re-use . . . . . . 205--208
            Ashok Erramilli and   
            Onuttom Narayan and   
               Walter Willinger   Experimental queueing analysis with
                                  long-range dependent packet traffic  . . 209--223
       Partho Pratim Mishra and   
             Hemant Kanakia and   
             Satish K. Tripathi   On hop-by-hop rate-based congestion
                                  control  . . . . . . . . . . . . . . . . 224--239
                 Hongbo Zho and   
                Victor S. Frost   In-service monitoring for cell loss
                                  quality of service violations in ATM
                                  networks . . . . . . . . . . . . . . . . 240--248
         Dominique Ga\"\iti and   
                    Guy Pujolle   Performance management issues in ATM
                                  networks: traffic and congestion control 249--257
           Lillykutty Jacob and   
                   Anurag Kumar   Delay performance of some scheduling
                                  strategies in an input queuing ATM
                                  switch with multiclass bursty traffic    258--271
      Andrea E. F. Clementi and   
                Miriam Di Ianni   On the hardness of approximating optimum
                                  schedule problems in store and forward
                                  networks . . . . . . . . . . . . . . . . 272--280
      Fotios K. Liotopoulos and   
               Suresh Chalasani   Semi-rearrangeably nonblocking operation
                                  of Clos networks in the multirate
                                  environment  . . . . . . . . . . . . . . 281--291
               Eitan Altman and   
                  Daniel Kofman   Bounds for performance measures of token
                                  rings  . . . . . . . . . . . . . . . . . 292--299

IEEE\slash ACM Transactions on Networking
Volume 4, Number 3, June, 1996

           Daniel P. Heyman and   
                 T. V. Lakshman   What are the implications of long-range
                                  dependence for VBR-video traffic
                                  engineering? . . . . . . . . . . . . . . 301--317
              Torsten Braun and   
                Christophe Diot   Performance evaluation and cache
                                  analysis of an ILP protocol
                                  implementation . . . . . . . . . . . . . 318--330
              Mete Kabatepe and   
             Kenneth S. Vastola   The fair distributed queue (FDQ)
                                  protocol for high-speed
                                  metropolitan-area networks . . . . . . . 331--339
           Thierry Turletti and   
              Christian Huitema   Videoconferencing on the Internet  . . . 340--351
            Dallas E. Wrege and   
         Edward W. Knightly and   
                  Hui Zhang and   
            Jörg Liebeherr   Deterministic delay bounds for VBR video
                                  in packet-switching networks:
                                  fundamental limits and practical
                                  trade-offs . . . . . . . . . . . . . . . 352--362
               Reuven Cohen and   
             Baiju V. Patel and   
              Frank Schaffa and   
          Marc Willebeek-LeMair   The sink tree paradigm: connectionless
                                  traffic support on ATM LAN's . . . . . . 363--374
               M. Shreedhar and   
                George Varghese   Efficient fair queueing using deficit
                                  round-robin  . . . . . . . . . . . . . . 375--385
               Guo-Liang Wu and   
                    Jon W. Mark   Computational methods for performance
                                  evaluation of a statistical multiplexer
                                  supporting bursty traffic  . . . . . . . 386--397
             Leandros Tassiulas   Push forward link-level scheduling for
                                  network-wide performance . . . . . . . . 398--406
  Georgios I. Papadimitriou and   
           Dimitris G. Maritsas   Learning automata-based receiver
                                  conflict avoidance algorithms for WDM
                                  broadcast-and-select star networks . . . 407--412
              Sassan Pejhan and   
            Mischa Schwartz and   
           Dimitris Anastassiou   Error control using retransmission
                                  schemes in multicast transport protocols
                                  for real-time media  . . . . . . . . . . 413--427
              Manjari Asawa and   
                 Wayne E. Stark   Optimal scheduling of handoffs in
                                  cellular networks  . . . . . . . . . . . 428--441
               Yitzhak Birk and   
                     Noam Bloch   The effects of destructive interference
                                  and wasted transmissions on the
                                  uniform-traffic capacity of
                                  non-bus-oriented single-hop
                                  interconnections . . . . . . . . . . . . 442--448
           Vincenzo Catania and   
            Giuseppe Ficili and   
             Sergio Palazzo and   
                  Daniela Panno   A comparative analysis of fuzzy versus
                                  conventional policing mechanisms for ATM
                                  networks . . . . . . . . . . . . . . . . 449--459
            Ray-Guang Cheng and   
                 Chung-Ju Chang   Design of a fuzzy traffic controller for
                                  ATM networks . . . . . . . . . . . . . . 460--469
              Jacek \'Swiderski   Approximate performance analysis of
                                  real-time traffic over heavily loaded
                                  networks with timed token protocols  . . 470--478

IEEE\slash ACM Transactions on Networking
Volume 4, Number 4, August, 1996

        Leonidas Georgiadis and   
         Roch Guérin and   
                Vinod Peris and   
             Kumar N. Sivarajan   Efficient network QoS provisioning based
                                  on per node traffic shaping  . . . . . . 482--501
                   R. Ahuja and   
                  S. Keshav and   
                       H. Saran   Design, implementation, and performance
                                  measurement of a native-mode ATM
                                  transport layer (extended version) . . . 502--515
            James D. Salehi and   
            James F. Kurose and   
                    Don Towsley   The effectiveness of affinity-based
                                  scheduling in multiprocessor network
                                  protocol processing (extended version)   516--530
              Debasis Mitra and   
           John A. Morrison and   
             K. G. Ramakrishnan   ATM network design and optimization: a
                                  multirate loss network framework . . . . 531--543
         Suresh Subramaniam and   
           Murat Azizo\uglu and   
                 Arun K. Somani   All-optical networks with sparse
                                  wavelength conversion  . . . . . . . . . 544--557
                  S. Ramanathan   Multicast tree generation in networks
                                  with asymmetric links  . . . . . . . . . 558--568
                Anna Charny and   
         K. K. Ramakrishnan and   
                  Anthony Lauck   Time scale analysis scalability issues
                                  for explicit rate allocation in ATM
                                  networks . . . . . . . . . . . . . . . . 569--581
              Israel Zibman and   
                 Carl Woolf and   
             Peter O'Reilly and   
           Larry Strickland and   
               David Willis and   
                    John Visser   An architectural approach to minimizing
                                  feature interactions in
                                  telecommunications . . . . . . . . . . . 582--596
              William S. Marcus   An architecture for QoS analysis and
                                  experimentation  . . . . . . . . . . . . 597--603
             Peter J. Smith and   
                  Mansoor Shafi   The impact of G.826 on the performance
                                  of transport systems . . . . . . . . . . 604--614
      Pratyush Moghé and   
                    Izhak Rubin   Enhanced call: a paradigm for
                                  applications with dynamic
                                  client-membership and client-level
                                  binding in ATM networks  . . . . . . . . 615--628
            Ian F. Akyildiz and   
            Joseph S. M. Ho and   
                    Yi-Bing Lin   Movement-based location update and
                                  selective paging for PCS networks  . . . 629--638
              Eytan Modiano and   
             Anthony Ephremides   Efficient algorithms for performing
                                  packet broadcasts in a mesh network  . . 639--648
                Izhak Rubin and   
                     Ho-Ting Wu   Performance analysis and design of CQBT
                                  algorithm for a ring network with
                                  spatial reuse  . . . . . . . . . . . . . 649--659
András L. Oláh and   
     Sonia M. Heemstra de Groot   Comments on ``Minimum-latency transport
                                  protocols with modulo-$N$''  . . . . . . 660--666

IEEE\slash ACM Transactions on Networking
Volume 4, Number 5, October, 1996

               Fengmin Gong and   
          Gurudatta M. Parulkar   An application-oriented error control
                                  scheme for high-speed networks . . . . . 669--683
        Biswanath Mukherjee and   
         Dhritiman Banerjee and   
              S. Ramamurthy and   
             Amarnath Mukherjee   Some principles for designing a
                                  wide-area WDM optical network  . . . . . 684--696
               Simon S. Lam and   
                 Simon Chow and   
                David K. Y. Yau   A lossless smoothing algorithm for
                                  compressed video . . . . . . . . . . . . 697--708
            Joseph S. M. Ho and   
                Ian F. Akyildiz   Local anchor scheme for reducing
                                  signaling costs in personal
                                  communications networks  . . . . . . . . 709--725
             Alberto Bononi and   
                Paul R. Prucnal   Analytical evaluation of improved access
                                  techniques in deflection routing
                                  networks . . . . . . . . . . . . . . . . 726--730
         Kenneth J. Schultz and   
                 P. Glenn Gulak   Multicast contention resolution with
                                  single-cycle windowing using content
                                  addressable FIFO's . . . . . . . . . . . 731--742
               Jong Suk Ahn and   
                Peter B. Danzig   Packet network simulation: speedup and
                                  accuracy versus timing granularity . . . 743--757
             Tsern-Huei Lee and   
               Kuen-Chu Lai and   
                Shii-Tyng Duann   Design of a real-time call admission
                                  controller for ATM networks  . . . . . . 758--765
              Reuven Elbaum and   
                     Moshe Sidi   Topological design of local-area
                                  networks using genetic algorithms  . . . 766--778
         Bhagirath Narahari and   
               Sunil Shende and   
                    Rahul Simha   Efficient algorithms for erasure node
                                  placement on slotted dual bus networks   779--784
             Anjali Agarwal and   
              J. William Atwood   A unified approach to fault-tolerance in
                                  communication protocols based on
                                  recovery procedures  . . . . . . . . . . 785--795
               Cesar Vargas and   
         Manjunath V. Hegde and   
       Morteza Naraghi-Pour and   
                    Paul S. Min   Shadow prices for LLR and ALBA . . . . . 796--807

IEEE\slash ACM Transactions on Networking
Volume 4, Number 6, December, 1996

              Steven H. Low and   
      Nicholas F. Maxemchuk and   
                    Sanjoy Paul   Anonymous credit cards and their
                                  collusion analysis . . . . . . . . . . . 809--816
               Jonathan Kay and   
                Joseph Pasquale   Profiling and reducing processing
                                  overheads in TCP/IP  . . . . . . . . . . 817--828
            Carey L. Williamson   Dynamic bandwidth allocation using
                                  loss-load curves . . . . . . . . . . . . 829--839
         Thomas F. La Porta and   
      Malathi Veeraraghavan and   
             Richard W. Buskens   Comparison of signaling loads for PCS
                                  systems  . . . . . . . . . . . . . . . . 840--856
       Symeon Papavassiliou and   
             Leandros Tassiulas   Joint optimal channel base station and
                                  power assignment for wireless access . . 857--872
              Ornan Gerstel and   
               Israel Cidon and   
                    Shmuel Zaks   The layout of virtual paths in ATM
                                  networks . . . . . . . . . . . . . . . . 873--884
        Jörg Liebeherr and   
            Dallas E. Wrege and   
               Domenico Ferrari   Exact admission control for networks
                                  with a bounded delay service . . . . . . 885--901
           Hosame Abu-Amara and   
              Brian A. Coan and   
               Shlomi Dolev and   
            Arkady Kanevsky and   
              Jennifer L. Welch   Self-stabilizing topology maintenance
                                  protocols for high-speed networks  . . . 902--912
               Hongsik Choi and   
             Hyeong-Ah Choi and   
               Murat Azizo\uglu   Efficient scheduling of transmissions in
                                  optical broadcast networks . . . . . . . 913--920
            Sung-hark Chung and   
                 Hu-gon Kim and   
             Yong-seok Yoon and   
                  Dong-wan Tcha   Cost-minimizing construction of a
                                  unidirectional SHR with diverse
                                  protection . . . . . . . . . . . . . . . 921--928
                 Ahmed E. Kamal   Performance modeling of partial packet
                                  discarding using the end-of-packet
                                  indicator in AAL type 5  . . . . . . . . 929--940
             Sridhar Ramesh and   
        Catherine Rosenberg and   
                   Anurag Kumar   Revenue maximization in ATM networks
                                  using the CLP capability and buffer
                                  priority management  . . . . . . . . . . 941--950
              Olaf Henniger and   
             Michel Barbeau and   
         Behçet Sarikaya   Specification and testing of the
                                  behavior of network management agents
                                  using SDL-92 . . . . . . . . . . . . . . 951--962


IEEE\slash ACM Transactions on Networking
Volume 5, Number 1, February, 1997

            David A. Levine and   
            Ian F. Akyildiz and   
             Mahmoud Naghshineh   A resource estimation and call admission
                                  algorithm for wireless multimedia
                                  networks using the shadow cluster
                                  concept  . . . . . . . . . . . . . . . . 1--12
                Chih-Lin I. and   
         Gregory P. Pollini and   
              Richard D. Gitlin   PCS mobility management using the
                                  reverse virtual call setup algorithm . . 13--24
                    Yi-Bing Lin   Reducing location update cost in a PCS
                                  network  . . . . . . . . . . . . . . . . 25--33
              Dong-wan Tcha and   
             Yong-joo Chung and   
                  Taek-jin Choi   A new lower bound for the frequency
                                  assignment problem . . . . . . . . . . . 34--39
        Charles R. Kalmanek and   
          Srinivasan Keshav and   
        William T. Marshall and   
           Samuel P. Morgan and   
         Robert C. Restrick III   Xunet 2: lessons from an early wide-area
                                  ATM testbed  . . . . . . . . . . . . . . 40--55
                Sugih Jamin and   
            Peter B. Danzig and   
           Scott J. Shenker and   
                    Lixia Zhang   A measurement-based admission control
                                  algorithm for integrated service packet
                                  networks . . . . . . . . . . . . . . . . 56--70
           Walter Willinger and   
             Murad S. Taqqu and   
             Robert Sherman and   
               Daniel V. Wilson   Self-similarity through
                                  high-variability: statistical analysis
                                  of Ethernet LAN traffic at the source
                                  level  . . . . . . . . . . . . . . . . . 71--86
                  Soung C. Liew   On the stability of shuffle-exchange and
                                  bidirectional shuffle-exchange
                                  deflection networks  . . . . . . . . . . 87--94
                  San-qi Li and   
                 Chia-lin Hwang   On the convergence of traffic
                                  measurement and queueing analysis: a
                                  statistical-matching and queueing (SMAQ)
                                  tool . . . . . . . . . . . . . . . . . . 95--110
                 Yoram Ofek and   
            Khosrow Sohraby and   
                     Ho-Ting Wu   Integration of synchronous and
                                  asynchronous traffic on the MetaRing and
                                  its performance study  . . . . . . . . . 111--121
             Wassim Matragi and   
            Khosrow Sohraby and   
            Chatschik Bisdikian   Jitter calculus in ATM networks:
                                  multiple nodes . . . . . . . . . . . . . 122--133
            Zbigniew Dziong and   
                 Marek Juda and   
                 Lorne G. Mason   A framework for bandwidth management in
                                  ATM networks --- aggregate equivalent
                                  bandwidth estimation approach  . . . . . 134--147
   J. J. Garcia-Luna-Aceves and   
                   Shree Murthy   A path-finding algorithm for loop-free
                                  routing  . . . . . . . . . . . . . . . . 148--160
          Yannis A. Korilis and   
             Aurel A. Lazar and   
                     Ariel Orda   Achieving network optima using
                                  Stackelberg routing strategies . . . . . 161--173

IEEE\slash ACM Transactions on Networking
Volume 5, Number 2, April, 1997

            Terence D. Todd and   
                 Ellen L. Hahne   Multi-access mesh (multimesh) networks   181--189
               Israel Cidon and   
        Leonidas Georgiadis and   
         Roch Guérin and   
                  Yuval Shavitt   Improved fairness algorithms for rings
                                  with spatial reuse . . . . . . . . . . . 190--204
               Simon S. Lam and   
                Geoffrey G. Xie   Group priority scheduling  . . . . . . . 205--218
         Edward W. Knightly and   
                      Hui Zhang   D-BIND: an accurate traffic model for
                                  providing QoS guarantees to VBR traffic  219--231
        Norival R. Figueira and   
                Joseph Pasquale   A schedulability condition for
                                  deadline-ordered service disciplines . . 232--244
               John M. Spinelli   Self-stabilizing sliding window ARQ
                                  protocols  . . . . . . . . . . . . . . . 245--254
           Michael Andersin and   
                Jens Zander and   
                    Zvi Rosberg   Soft and safe admission control in
                                  cellular networks  . . . . . . . . . . . 255--265
        Albert G. Greenberg and   
                     R. Srikant   Computational techniques for accurate
                                  performance evaluation of multirate,
                                  multihop communication networks  . . . . 266--277
            Hiroyuki Ohsaki and   
             Naoki Wakamiya and   
            Masayuki Murata and   
                 Hideo Miyahara   Performance of an input/output
                                  buffered-type ATM LAN switch with
                                  back-pressure function . . . . . . . . . 278--290
             Raffaele Bolla and   
                  Franco Davoli   Control of multirate synchronous streams
                                  in hybrid TDM access networks  . . . . . 291--304
              Joel E. Cohen and   
                 Clark Jeffries   Congestion resulting from increased
                                  capacity in single-server queueing
                                  networks . . . . . . . . . . . . . . . . 305--310
      Marc Willebeek-LeMair and   
             Perwez Shahabuddin   Approximating dependability measures of
                                  computer networks: an FDDI case study    311--327

IEEE\slash ACM Transactions on Networking
Volume 5, Number 3, June, 1997

               Fabrizio Sestini   Recursive copy generation for multicast
                                  ATM switching  . . . . . . . . . . . . . 329--335
             T. V. Lakshman and   
                Upamanyu Madhow   The performance of TCP/IP for networks
                                  with high bandwidth-delay products and
                                  random loss  . . . . . . . . . . . . . . 336--350
Jean-François P. Labourdette   Performance impact of partial
                                  reconfiguration on multihop lightwave
                                  networks . . . . . . . . . . . . . . . . 351--358
          George N. Rouskas and   
                Vijay Sivaraman   Packet scheduling in broadcast WDM
                                  networks with arbitrary transceiver
                                  tuning latencies . . . . . . . . . . . . 359--370
          Bhargav R. Bellur and   
                Galen H. Sasaki   A SAT-based network access scheme for
                                  fairness in high speed networks  . . . . 371--381
            Wing-cheong Lau and   
                      San-qi Li   Statistical multiplexing and buffer
                                  sharing in multimedia high-speed
                                  networks: a frequency-domain perspective 382--396
             Boris Tsybakov and   
           Nicoals D. Georganas   On self-similar traffic in ATM queues:
                                  definitions, overflow probability bound,
                                  and cell delay distribution  . . . . . . 397--409
                    Oran Sharon   A proof for lack of starvation in DQDB
                                  with and without slot reuse  . . . . . . 410--420
       George M. Stamatelos and   
       Vassilios N. Koukoulidis   Reservation-based bandwidth allocation
                                  in a radio ATM network . . . . . . . . . 420--428
                  San-qi Li and   
              James D. Pruneski   The linearity of low frequency traffic
                                  flow: an intrinsic I/O property in
                                  queueing systems . . . . . . . . . . . . 429--443

IEEE\slash ACM Transactions on Networking
Volume 5, Number 4, August, 1997

             Bobby Krupczak and   
         Kenneth L. Calvert and   
               Mostafa H. Ammar   Increasing the portability and
                                  re-usability of protocol code  . . . . . 445--459
         Deborah A. Wallach and   
           Dawson R. Engler and   
              M. Frans Kaashoek   ASHs: application-specific handlers for
                                  high-performance messaging . . . . . . . 460--474
            David K. Y. Yau and   
                   Simon S. Lam   Adaptive rate-controlled scheduling for
                                  multimedia applications  . . . . . . . . 475--488
         Thomas F. La Porta and   
            Kuo-Wei Herman Chen   A direct signaling system for flexible
                                  access and deployment of
                                  telecommunication services . . . . . . . 489--501
           Duke Tantiprasut and   
                  John Neil and   
                  Craig Farrell   ASN.1 protocol specification for use
                                  with arbitrary encoding schemes  . . . . 502--513
        Claude Castelluccia and   
              Walid Dabbous and   
                  Sean O'Malley   Generating efficient protocol code from
                                  an abstract specification  . . . . . . . 514--524
András L. Oláh and   
     Sonia M. Heemstra de Groot   Alternative specification and
                                  verification of a periodic state
                                  exchange protocol  . . . . . . . . . . . 525--529
          Bülent Yener and   
         Spyridon Matsoukas and   
                     Yoram Ofek   Iterative approach to optimizing
                                  convergence routing priorities . . . . . 530--542
             Randall Landry and   
            Ioannis Stavrakakis   Study of delay jitter with and without
                                  peak rate enforcement  . . . . . . . . . 543--553
               Daniel P. Heyman   The GBAR source model for VBR
                                  videoconferences . . . . . . . . . . . . 554--560
                Pawan Goyal and   
                 Harrick M. Vin   Generalized guaranteed rate scheduling
                                  algorithms: a framework  . . . . . . . . 561--571
             Brahim Bensaou and   
          Shirley T. C. Lam and   
                Hon-Wai Chu and   
              Danny H. K. Tsang   Estimation of the cell loss ratio in ATM
                                  networks with a fuzzy system and
                                  application to measurement-based call
                                  admission control  . . . . . . . . . . . 572--584
               Kshirasagar Naik   Efficient computation of unique
                                  input/output sequences in finite-state
                                  machines . . . . . . . . . . . . . . . . 585--599
        Willibald Doeringer and   
        Günter Karjoth and   
                  Mehdi Nassehi   Corrections to ``Routing on
                                  longest-matching prefixes''  . . . . . . 600--600

IEEE\slash ACM Transactions on Networking
Volume 5, Number 5, October, 1997

                    Vern Paxson   End-to-end routing behavior in the
                                  Internet . . . . . . . . . . . . . . . . 601--615
             John Heidemann and   
             Katia Obraczka and   
                      Joe Touch   Modeling the performance of HTTP over
                                  several transport protocols  . . . . . . 616--630
           Martin F. Arlitt and   
            Carey L. Williamson   Internet Web servers: workload
                                  characterization and performance
                                  implications . . . . . . . . . . . . . . 631--645
            Joseph S. M. Ho and   
                Ian F. Akyildiz   Dynamic hierarchical database
                                  architecture for location management in
                                  PCS networks . . . . . . . . . . . . . . 646--660
              Jorge A. Cobb and   
               Mohamed G. Gouda   Flow theory  . . . . . . . . . . . . . . 661--674
          Jon C. R. Bennett and   
                      Hui Zhang   Hierarchical packet fair queueing
                                  algorithms . . . . . . . . . . . . . . . 675--689
                Pawan Goyal and   
             Harrick M. Vin and   
                  Haichen Cheng   Start-time fair queueing: a scheduling
                                  algorithm for integrated services packet
                                  switching networks . . . . . . . . . . . 690--704
    Emmanouel A. Varvarigos and   
                  Vishal Sharma   The ready-to-go virtual circuit
                                  protocol: a loss-free protocol for
                                  multigigabit networks using FIFO buffers 705--718
      Srini B. Tridandapani and   
        Biswanath Mukherjee and   
               Geir Hallingstad   Channel sharing in multi-hop WDM
                                  lightwave networks: do we need more
                                  channels?  . . . . . . . . . . . . . . . 719--727
       Abhijit K. Choudhury and   
                 Ellen L. Hahne   A new buffer management scheme for
                                  hierarchical shared memory switches  . . 728--738

IEEE\slash ACM Transactions on Networking
Volume 5, Number 6, December, 1997

      Matthias Grossglauser and   
          Srinivasan Keshav and   
                David N. C. Tse   RCBR: a simple and efficient service for
                                  multiple time-scale traffic  . . . . . . 741--755
          Hari Balakrishnan and   
     Venkata N. Padmanabhan and   
          Srinivasan Seshan and   
                  Randy H. Katz   A comparison of mechanisms for improving
                                  TCP performance over wireless links  . . 756--769
            Ellen W. Zegura and   
         Kenneth L. Calvert and   
             Michael J. Donahoo   A quantitative comparison of graph-based
                                  models for Internet topology . . . . . . 770--783
                Sally Floyd and   
               Van Jacobson and   
             Ching-Gung Liu and   
             Steven McCanne and   
                    Lixia Zhang   A reliable multicast framework for
                                  light-weight sessions and application
                                  level framing  . . . . . . . . . . . . . 784--803
            Imrich Chlamtac and   
András Faragó and   
                 Hongbiao Zhang   Time-spread multiple-access (TSMA)
                                  protocols for multihop mobile radio
                                  networks . . . . . . . . . . . . . . . . 804--812
             Timothy Weller and   
                    Bruce Hajek   Scheduling nonuniform traffic in a
                                  packet-switching system with small
                                  propagation delay  . . . . . . . . . . . 813--823
            George Varghese and   
                  Anthony Lauck   Hashed and hierarchical timing wheels:
                                  efficient data structures for
                                  implementing a timer facility  . . . . . 824--834
           Mark E. Crovella and   
                 Azer Bestavros   Self-similarity in World Wide Web
                                  traffic: evidence and possible causes    835--846
                Shai Herzog and   
              Scott Shenker and   
                 Deborah Estrin   Sharing the ``cost'' of multicast trees:
                                  an axiomatic analysis  . . . . . . . . . 847--860
             Aurel A. Lazar and   
                 Ariel Orda and   
        Dimitrios E. Pendarakis   Virtual path bandwidth allocation in
                                  multiuser networks . . . . . . . . . . . 861--871
               John O. Limb and   
                    Dolors Sala   A protocol for efficient transfer of
                                  data over hybrid fiber/coax systems  . . 872--881
           Giuseppe Bianchi and   
                 Riccardo Melen   The role of local storage in supporting
                                  video retrieval services on ATM networks 882--892
               Yuguang Fang and   
            Imrich Chlamtac and   
                    Yi-Bing Lin   Modeling PCS networks under general call
                                  holding time and cell residence time
                                  distributions  . . . . . . . . . . . . . 893--906
     Partha P. Bhattacharya and   
        Leonidas Georgiadis and   
                 Arvind Krishna   Distributed channel allocation for PCN
                                  with variable rate traffic . . . . . . . 907--923
           Ramaswamy Murali and   
                Brian L. Hughes   Random access with large propagation
                                  delay  . . . . . . . . . . . . . . . . . 924--935
            Rajiv Ramaswami and   
                  Adrian Segall   Distributed network control for optical
                                  networks . . . . . . . . . . . . . . . . 936--943
                   D. Medhi and   
                   Sujit Guptan   Network dimensioning and performance of
                                  multiservice, multirate loss networks
                                  with dynamic routing . . . . . . . . . . 944--957
             Alfio Lombardo and   
              Giovanni Schembra   An analytical paradigm to compare
                                  routing strategies in an ATM multimedia
                                  environment  . . . . . . . . . . . . . . 958--969
              Rauf Izmailov and   
              Duan-Shin Lee and   
               Bhaskar Sengupta   Design and analysis of a congestion-free
                                  overlay on a high-speed network  . . . . 970--980
            M. H. MacGregor and   
                Wayne D. Grover   Distributed partial-express routing of
                                  broad-band transport network demands . . 981--988
          Bülent Yener and   
                 Yoram Ofek and   
                      Moti Yung   Combinatorial design of congestion-free
                                  networks . . . . . . . . . . . . . . . . 989--1000


IEEE\slash ACM Transactions on Networking
Volume 6, Number 1, February, 1998

            David G. Thaler and   
          Chinya V. Ravishankar   Using name-based mappings to increase
                                  hit rates  . . . . . . . . . . . . . . . 1--14
               Reuven Cohen and   
            Srinivas Ramanathan   TCP for high performance in hybrid fiber
                                  coaxial broad-band access networks . . . 15--29
            Geoffrey G. Xie and   
                   Simon S. Lam   Real-time block transfer under a
                                  link-sharing hierarchy . . . . . . . . . 30--41
              Soung C. Liew and   
              Derek Chi-yin Tse   A control-theoretic approach to adapting
                                  VBR compressed video for transport over
                                  a CBR communications channel . . . . . . 42--55
            Sudhir S. Dixit and   
                   Sharad Kumar   Traffic descriptor mapping and traffic
                                  control for frame relay over ATM network 56--70
         Bruce S. Northcote and   
                Donald E. Smith   Service control point overload rules to
                                  protect intelligent network services . . 71--81
               Andre Girard and   
          Brunilde Sansó   Multicommodity flow models, failure
                                  propagation, and reliable loss network
                                  design . . . . . . . . . . . . . . . . . 82--93
               K. Ravindran and   
                 Ting-Jian Gong   Cost analysis of multicast transport
                                  architectures in multiservice networks   94--109

IEEE\slash ACM Transactions on Networking
Volume 6, Number 2, April, 1998

               Peter Newman and   
              Greg Minshall and   
                 Thomas L. Lyon   IP switching --- ATM under IP  . . . . . 117--129
       Abhijit K. Choudhury and   
                 Ellen L. Hahne   Dynamic queue length thresholds for
                                  shared-memory packet switches  . . . . . 130--140
         Aleksandr Privalov and   
                Khosrow Sohraby   Per-stream jitter analysis in CBR ATM
                                  multiplexors . . . . . . . . . . . . . . 141--149
            Cathy A. Fulton and   
                      San-qi Li   Delay jitter first-order and
                                  second-order statistical functions of
                                  general traffic on high-speed multimedia
                                  networks . . . . . . . . . . . . . . . . 150--163
        Dimitrios Stiliadis and   
                   Anujan Varma   Rate-proportional servers: a design
                                  methodology for fair queueing algorithms 164--174
        Dimitrios Stiliadis and   
                   Anujan Varma   Efficient fair queueing algorithms for
                                  packet-switched networks . . . . . . . . 175--185
              Ezhan Karasan and   
                 Ender Ayanoglu   Effects of wavelength routing and
                                  selection algorithms on wavelength
                                  conversion gain in WDM optical networks  186--196
              Ahmed Mokhtar and   
               Murat Azizo\uglu   Adaptive wavelength routing in
                                  all-optical networks . . . . . . . . . . 197--206
          Kazutaka Murakami and   
                   Hyong S. Kim   Optimal capacity and flow assignment for
                                  self-healing ATM networks based on line
                                  and end-to-end restoration . . . . . . . 207--221
         Nikolaos Anerousis and   
                 Aurel A. Lazar   Virtual path control for ATM networks
                                  with call level quality of service
                                  guarantees . . . . . . . . . . . . . . . 222--236

IEEE\slash ACM Transactions on Networking
Volume 6, Number 3, June, 1998

            Craig Partridge and   
           Philip P. Carvey and   
                 Ed Burgess and   
          Isidro Castineyra and   
                 Tom Clarke and   
                Lise Graham and   
           Michael Hathaway and   
                Phil Herman and   
                 Allen King and   
              Steve Kohalmi and   
                   Tracy Ma and   
               John Mcallen and   
              Trevor Mendez and   
         Walter C. Milliken and   
           Ronald Pettyjohn and   
                John Rokosz and   
              Joshua Seeger and   
            Michael Sollins and   
               Steve Storch and   
             Benjamin Tober and   
              Gregory D. Troxel   A 50-Gb/s IP router  . . . . . . . . . . 237--248
        Ramachandran Ramjee and   
         Thomas F. La Porta and   
                 Jim Kurose and   
                    Don Towsley   Performance evaluation of connection
                                  rerouting schemes for ATM-based wireless
                                  networks . . . . . . . . . . . . . . . . 249--261
         Mats Björkman and   
                Per Gunningberg   Performance modeling of multiprocessor
                                  implementations of protocols . . . . . . 262--273
              Jorge A. Cobb and   
           Mohamed G. Gouda and   
                  Amal El-Nahas   Time-shift scheduling --- fair
                                  scheduling of flows in high-speed
                                  networks . . . . . . . . . . . . . . . . 274--285
               Ehud Aharoni and   
                   Reuven Cohen   Restricted dynamic Steiner trees for
                                  scalable multicast in datagram networks  286--297
                  Ji-Her Ju and   
                Victor O. K. Li   An optimal topology-transparent
                                  scheduling method in multihop packet
                                  radio networks . . . . . . . . . . . . . 298--306
              Soung C. Liew and   
               Ming-Hung Ng and   
                  Cathy W. Chan   Blocking and nonblocking multirate Clos
                                  switching networks . . . . . . . . . . . 307--318
        Kwan Lawrence Yeung and   
            Tak-Shing Peter Yum   Node placement optimization in
                                  ShuffleNets  . . . . . . . . . . . . . . 319--324
         Rainer R. Iraschko and   
            M. H. MacGregor and   
                Wayne D. Grover   Optimal capacity placement for path
                                  restoration in STM or ATM
                                  mesh-survivable networks . . . . . . . . 325--336
             B. Neelakantan and   
                 S. V. Raghavan   Scientific foundations to the multilevel
                                  method . . . . . . . . . . . . . . . . . 337--346

IEEE\slash ACM Transactions on Networking
Volume 6, Number 4, August, 1998

     Jörg Nonnenmacher and   
          Ernst W. Biersack and   
                    Don Towsley   Parity-based loss recovery for reliable
                                  multicast transmission . . . . . . . . . 349--361
             David D. Clark and   
                    Wenjia Fang   Explicit allocation of best-effort
                                  packet delivery service  . . . . . . . . 362--373
          R. Gopalakrishnan and   
          Gurudatta M. Parulkar   Efficient user-space protocol
                                  implementations with QoS guarantees
                                  using real-time upcalls  . . . . . . . . 374--388
                Philipp Hoschka   Compact and efficient presentation
                                  conversion code  . . . . . . . . . . . . 389--396
            James D. Salehi and   
               Shi-Li Zhang and   
                 Jim Kurose and   
                    Don Towsley   Supporting stored video: reducing rate
                                  variability and end-to-end resource
                                  requirements through optimal smoothing   397--410
             Ness B. Shroff and   
                Mischa Schwartz   Improved loss calculations at an ATM
                                  multiplexer  . . . . . . . . . . . . . . 411--421
            Imrich Chlamtac and   
             Hongbiao Zhang and   
András Faragó and   
               Andrea Fumagalli   A deterministic approach to the
                                  end-to-end analysis of packet flows in
                                  connection-oriented networks . . . . . . 422--431
          Ornan Ori Gerstel and   
               Israel Cidon and   
                    Shmuel Zaks   Efficient support for client/server
                                  applications over heterogeneous ATM
                                  network  . . . . . . . . . . . . . . . . 432--446
           Arthur W. Berger and   
                     Ward Whitt   Effective bandwidths with priorities . . 447--460
              Mehrdad Parsa and   
                   Qing Zhu and   
       J. J. Garcia-Luna-Aceves   An iterative algorithm for
                                  delay-constrained minimum-cost
                                  multicasting . . . . . . . . . . . . . . 461--474
               Nen-Fu Huang and   
                   Huey-Ing Liu   A study of isochronous channel reuse in
                                  DQDB metropolitan area networks  . . . . 475--484
                   Anurag Kumar   Comparative performance analysis of
                                  versions of TCP in a local network with
                                  a lossy link . . . . . . . . . . . . . . 485--498
             Tsern-Huei Lee and   
                   Kuen-Chu Lai   Characterization of delay-sensitive
                                  traffic  . . . . . . . . . . . . . . . . 499--504

IEEE\slash ACM Transactions on Networking
Volume 6, Number 5, October, 1998

                 David L. Mills   Adaptive hybrid clock discipline
                                  algorithm for the network time protocol  505--514
             Craig Labovitz and   
            G. Robert Malan and   
                Farnam Jahanian   Internet routing instability . . . . . . 515--528
             Jonathan Stone and   
          Michael Greenwald and   
            Craig Partridge and   
                   James Hughes   Performance of checksums and CRC's over
                                  real data  . . . . . . . . . . . . . . . 529--543
                    Hao Che and   
                  San-qi Li and   
                     Arthur Lin   Adaptive resource management for
                                  flow-based IP/ATM hybrid switching
                                  systems  . . . . . . . . . . . . . . . . 544--557
              Victor Firoiu and   
                 Jim Kurose and   
                    Don Towsley   Efficient admission control of piecewise
                                  linear traffic envelopes at EDF
                                  schedulers . . . . . . . . . . . . . . . 558--570
           Shivakant Mishra and   
                         Lei Wu   An evaluation of flow control in group
                                  communication  . . . . . . . . . . . . . 571--587
                Bruce Hajek and   
                      Linhai He   On variations of queue response for
                                  inputs with the same mean and
                                  autocorrelation function . . . . . . . . 588--598
        Lampros Kalampoukas and   
                   Anujan Varma   Analysis of source policy and its
                                  effects on TCP in rate-controlled ATM
                                  networks . . . . . . . . . . . . . . . . 599--610
        Dimitrios Stiliadis and   
                   Anujan Varma   Latency-rate servers: a general model
                                  for analysis of traffic scheduling
                                  algorithms . . . . . . . . . . . . . . . 611--624
             Kohei Shiomoto and   
           Shinichiro Chaki and   
                Naoaki Yamanaka   A simple bandwidth management strategy
                                  based on measurements of instantaneous
                                  virtual path utilization in ATM networks 625--634
       Abdelnaser Mohammad Adas   Using adaptive linear prediction to
                                  support real-time VBR video under RCBR
                                  network service model  . . . . . . . . . 635--644
                      Peter Kim   Deterministic service guarantees in IEEE
                                  802.12 networks --- part I: the
                                  single-hub case  . . . . . . . . . . . . 645--658
                Jinwoo Choe and   
                 Ness B. Shroff   A central-limit-theorem-based approach
                                  for analyzing queue behavior in
                                  high-speed networks  . . . . . . . . . . 659--671

IEEE\slash ACM Transactions on Networking
Volume 6, Number 6, December, 1998

              Anja Feldmann and   
           Jennifer Rexford and   
    Ramón Cáceres   Efficient policies for carrying Web
                                  traffic over flow-switched networks  . . 673--685
             Ching-Gung Liu and   
             Deborah Estrin and   
              Scott Shenker and   
                    Lixia Zhang   Local error recovery in SRM: comparison
                                  of two approaches  . . . . . . . . . . . 686--699
            David K. Y. Yau and   
                   Simon S. Lam   Migrating sockets --- end system support
                                  for networking with quality of service
                                  guarantees . . . . . . . . . . . . . . . 700--716
             N. G. Duffield and   
         K. K. Ramakrishnan and   
                 Amy R. Reibman   SAVE: an algorithm for smoothed adaptive
                                  video over explicit rate networks  . . . 717--728
        Lampros Kalampoukas and   
               Anujan Varma and   
             K. K. Ramakrishnan   Two-way TCP traffic over rate controlled
                                  channels: effects and analysis . . . . . 729--743
            Rajiv Ramaswami and   
                   Galen Sasaki   Multiwavelength optical networks with
                                  limited wavelength conversion  . . . . . 744--754
           Byrav Ramamurthy and   
                Jason Iness and   
            Biswanath Mukherjee   Optimizing amplifier placements in a
                                  multiwavelength optical LAN/MAN: the
                                  unequally powered wavelengths case . . . 755--767
             Dean H. Lorenz and   
                     Ariel Orda   QoS routing in networks with uncertain
                                  parameters . . . . . . . . . . . . . . . 768--778
              Debanjan Saha and   
            Sarit Mukherjee and   
             Satish K. Tripathi   Carry-over round robin: a simple cell
                                  scheduling mechanism for ATM networks    779--796
         Lalita A. Kulkarni and   
                      San-qi Li   Performance analysis of a rate-based
                                  feedback control scheme  . . . . . . . . 797--810
              Brian L. Mark and   
      Gopalakrishnan Ramamurthy   Real-time estimation and dynamic
                                  renegotiation of UPC parameters for
                                  arbitrary traffic sources in ATM
                                  networks . . . . . . . . . . . . . . . . 811--827
                    Xiaohua Jia   A distributed algorithm of delay-bounded
                                  multicast routing for multimedia
                                  applications in wide area networks . . . 828--837
             Seok-Kyu Kweon and   
                   Kang G. Shin   Providing deterministic delay guarantees
                                  in ATM networks  . . . . . . . . . . . . 838--850
                 Anna Ha\'c and   
                         Bo Liu   Database and location management schemes
                                  for mobile communications  . . . . . . . 851--865


IEEE\slash ACM Transactions on Networking
Volume 7, Number 1, February, 1999

            Imrich Chlamtac and   
       Viktória Elek and   
           Andrea Fumagalli and   
             Csaba Szabó   Scalable WDM access network architecture
                                  based on photonic slot routing . . . . . 1--9
        Albert G. Greenberg and   
                 R. Srikant and   
                     Ward Whitt   Resource sharing for book-ahead and
                                  instantaneous-request calls  . . . . . . 10--22
          Richard F. Hobson and   
                     P. S. Wong   A parallel embedded-processor
                                  architecture for ATM reassembly  . . . . 23--37
                   Junyi Li and   
             Ness B. Shroff and   
              Edwin K. P. Chong   Channel carrying: a novel handoff scheme
                                  for mobile cellular networks . . . . . . 38--50
            Imrich Chlamtac and   
            Chiara Petrioli and   
                     Jason Redi   Energy-conserving access protocols for
                                  identification networks  . . . . . . . . 51--59
                    Ge Nong and   
          Jogesh K. Muppala and   
                   Mounir Hamdi   Analysis of nonblocking ATM switches
                                  with multiple input queues . . . . . . . 60--74
          Jeffrey M. Capone and   
            Ioannis Stavrakakis   Delivering QoS requirements to traffic
                                  with diverse delay tolerances in a TDMA
                                  environment  . . . . . . . . . . . . . . 75--87
             Leandros Tassiulas   Cut-through switching, pipelining, and
                                  scheduling for network evacuation  . . . 88--97
                Yijun Xiong and   
                 Lorne G. Mason   Restoration strategies and spare
                                  capacity requirements in self-healing
                                  ATM networks . . . . . . . . . . . . . . 98--110
            Ray-Guang Cheng and   
             Chung-Ju Chang and   
                    Li-Fong Lin   A QoS-Provisioning neural fuzzy
                                  connection admission controller for
                                  multimedia high-speed networks . . . . . 111--121
             Alifo Lombardo and   
           Giacomo Morabito and   
              Giovanni Schembra   A discrete-time paradigm to evaluate
                                  skew performance in a multimedia ATM
                                  multiplexer  . . . . . . . . . . . . . . 122--139

IEEE\slash ACM Transactions on Networking
Volume 7, Number 2, April, 1999

            Ian F. Akyildiz and   
            David A. Levine and   
                     Inwhee Joe   A slotted CDMA protocol with BER
                                  scheduling for wireless multimedia
                                  networks . . . . . . . . . . . . . . . . 146--158
            Stuart Cheshire and   
                     Mary Baker   Consistent overhead Byte stuffing  . . . 159--172
              Wu-chang Feng and   
           Dilip D. Kandlur and   
              Debanjan Saha and   
                   Kang G. Shin   Understanding and improving TCP
                                  performance over networks with minimum
                                  rate guarantees  . . . . . . . . . . . . 173--187
                   Nick McKeown   The iSLIP scheduling algorithm for
                                  input-queued switches  . . . . . . . . . 188--201
           Jennifer Rexford and   
                    Don Towsley   Smoothing variable-bit-rate video in an
                                  Internetwork . . . . . . . . . . . . . . 202--215
               Yonghwan Kim and   
                      San-qi Li   Performance analysis of data packet
                                  discarding in ATM networks . . . . . . . 216--227
            Zygmunt J. Haas and   
                      Ben Liang   Ad hoc mobility management with uniform
                                  quorum systems . . . . . . . . . . . . . 228--240
              Chunming Qiao and   
                    Yousong Mei   Off-line permutation embedding and
                                  scheduling in multiplexed optical
                                  networks with regular topologies . . . . 241--250
  Mirjana Zafirovic-Vukotic and   
   Ignatius G. M. M. Niemegeers   Waiting time estimates in symmetric
                                  ATM-oriented rings with the destination
                                  release of used slots  . . . . . . . . . 251--261
                 Ajei Gopal and   
                Inder Gopal and   
                    Shay Kutten   Fast broadcast in high-speed networks    262--275

IEEE\slash ACM Transactions on Networking
Volume 7, Number 3, June, 1999

                    Vern Paxson   End-to-end Internet packet dynamics  . . 277--292
      Matthias Grossglauser and   
                David N. C. Tse   A framework for robust measurement-based
                                  admission control  . . . . . . . . . . . 293--309
             Rajeev Agrawal and   
               Rene L. Cruz and   
              Clayton Okino and   
                Rajendran Rajan   Performance bonds for flow control
                                  protocols  . . . . . . . . . . . . . . . 310--323
             Butler Lampson and   
    Venkatachary Srinivasan and   
                George Varghese   IP lookups using multiway and
                                  multicolumn search . . . . . . . . . . . 324--334
    Emmanouel A. Varvarigos and   
               Jonathan P. Lang   A virtual circuit deflection protocol    335--349
     Roche A. Guérin and   
                     Ariel Orda   QoS routing in networks with inaccurate
                                  information: theory and algorithms . . . 350--364
                     Ariel Orda   Routing with end-to-end QoS guarantees
                                  in broadband networks  . . . . . . . . . 365--374
     Jörg Nonnenmacher and   
              Ernst W. Biersack   Scalable feedback for large groups . . . 375--386
             Pietro Manzoni and   
            Paolo Cremonesi and   
               Giuseppe Serazzi   Workload models of VBR video traffic and
                                  their use in resource allocation
                                  policies . . . . . . . . . . . . . . . . 387--397
            Kavitha Chandra and   
                 Amy R. Reibman   Modeling one- and two-layer variable bit
                                  rate video . . . . . . . . . . . . . . . 398--413
               Rajesh K. Pankaj   Wavelength requirements for multicasting
                                  in all-optical networks  . . . . . . . . 414--424
                  Eytan Modiano   Random algorithms for scheduling
                                  multicast traffic in WDM
                                  broadcast-and-select networks  . . . . . 425--434
                Xijun Zhang and   
                  Chunming Qiao   On scheduling all-to-all personalized
                                  connections and cost-effective designs
                                  in WDM rings . . . . . . . . . . . . . . 435--445
               Abel Dasylva and   
                     R. Srikant   Optimal WDM schedules for optical star
                                  networks . . . . . . . . . . . . . . . . 446--456

IEEE\slash ACM Transactions on Networking
Volume 7, Number 4, August, 1999

                Sally Floyd and   
                     Kevin Fall   Promoting the use of end-to-end
                                  congestion control in the Internet . . . 458--472
                  Songwu Lu and   
         Vaduvur Bharghavan and   
                     R. Srikant   Fair scheduling in wireless packet
                                  networks . . . . . . . . . . . . . . . . 473--489
        Francesco Lo Presti and   
               Zhi-Li Zhang and   
                 Jim Kurose and   
                    Don Towsley   Source time scale and optimal
                                  buffer/bandwidth tradeoff for
                                  heterogeneous regulated traffic in a
                                  network node . . . . . . . . . . . . . . 490--501
             Chung Kei Wong and   
                   Simon S. Lam   Digital signatures for flows and
                                  multicasts . . . . . . . . . . . . . . . 502--513
            Sriram Raghavan and   
               G. Manimaran and   
             C. Siva Ram Murthy   A rearrangeable algorithm for the
                                  construction delay-constrained dynamic
                                  multicast trees  . . . . . . . . . . . . 514--529
                 Keith Kong and   
                   Dipak Ghosal   Mitigating server-side congestion in the
                                  Internet through pseudoserving . . . . . 530--544
                 Gaoxi Xiao and   
                 Yiu-Wing Leung   Algorithms for allocating wavelength
                                  converters in all-optical networks . . . 545--557
                Wayne D. Grover   High availability path design in
                                  ring-based optimal networks  . . . . . . 558--574
             Supriya Sharma and   
                Yannis Viniotis   Optimal buffer management policies for
                                  shared-buffer ATM switches . . . . . . . 575--587
              Jae-Hyun Park and   
               Hyunsoo Yoon and   
                  Heung-Kyu Lee   The deflection self-routing Banyan
                                  network: a large-scale ATM switch using
                                  the fully adaptive self-routing and its
                                  performance analyses . . . . . . . . . . 588--604

IEEE\slash ACM Transactions on Networking
Volume 7, Number 5, October, 1999

          Hemant M. Chaskar and   
             T. V. Lakshman and   
                      U. Madhow   TCP over wireless with link level error
                                  control: analysis and design methodology 605--615
              Sunghyun Choi and   
                   Kang G. Shin   An uplink CDMA system architecture with
                                  diverse QoS guarantees for heterogeneous
                                  traffic  . . . . . . . . . . . . . . . . 616--628
      Matthias Grossglauser and   
         Jean-Chrysostome Bolot   On the relevance of long-range
                                  dependence in network traffic  . . . . . 629--640
       Muriel Médard and   
             Steven G. Finn and   
               Richard A. Barry   Redundant trees for preplanned recovery
                                  in arbitrary vertex-redundant or
                                  edge-redundant graphs  . . . . . . . . . 641--652
                Anindo Banerjea   Fault recovery for guaranteed
                                  performance communications connections   653--668
        Hanrijanto Sariowan and   
               Rene L. Cruz and   
              George C. Polyzos   SCED: a generalized scheduling policy
                                  for guaranteeing quality-of-service  . . 669--684
              Wu-Chang Feng and   
               Dilip D. Kandlur   Adaptive packet marking for maintaining
                                  end-to-end throughput in a
                                  differentiated-services Internet . . . . 685--697
               G. Manimaran and   
    Hariharan Shankar Rahul and   
             C. Siva Ram Murthy   A new distributed route selection
                                  approach for channel establishment in
                                  real-time networks . . . . . . . . . . . 698--709
             T. V. Lakshman and   
               P. P. Mishra and   
             K. K. Ramakrishnan   Transporting compressed video over ATM
                                  networks with explicit-rate feedback
                                  control  . . . . . . . . . . . . . . . . 710--723
       Mayez A. Al-Mouhamed and   
       Mohammed Kaleemuddin and   
                   Habib Yousef   Evaluation of pipelined dilated banyan
                                  switch architectures for ATM networks    724--740
         Aleksandar Kolarov and   
                  G. Ramamurthy   A control-theoretic approach to the
                                  design of an explicit rate controller
                                  for ABR service  . . . . . . . . . . . . 741--753
         Suresh Subramaniam and   
           Murat Azizo\uglu and   
                 Arun K. Somani   On optimal converter placement in
                                  wavelength-routed networks . . . . . . . 754--766
             Murat Alanyali and   
                 Ender Ayanoglu   Provisioning algorithms for WDM optical
                                  networks . . . . . . . . . . . . . . . . 767--778
                    Ling Li and   
                 Arun K. Somani   Dynamic wavelength routing using
                                  congestion and neighborhood information  779--786

IEEE\slash ACM Transactions on Networking
Volume 7, Number 6, December, 1999

          Jon C. R. Bennett and   
            Craig Partridge and   
              Nicholas Shectman   Packet reordering is not pathological
                                  network behavior . . . . . . . . . . . . 789--798
            Stefano Basagni and   
            Imrich Chlamtac and   
                 Danilo Bruschi   A mobility-transparent deterministic
                                  broadcast mechanism for ad hoc networks  799--807
                 Zohar Naor and   
                    Hanoch Levy   LATS: a load-adaptive threshold scheme
                                  for tracking mobile users  . . . . . . . 808--817
                   Junyi Li and   
             Ness B. Shroff and   
                    K. P. Chong   A reduced-power channel reuse scheme for
                                  wireless packet cellular networks  . . . 818--832
                Ori Gerstel and   
               Galen Sasaki and   
                Shay Kutten and   
                Rajiv Ramaswami   Worst-case analysis of dynamic
                                  wavelength allocation in optical
                                  networks . . . . . . . . . . . . . . . . 833--846
                Demet Aksoy and   
               Michael Franklin   $R \times W$: a scheduling approach for
                                  large-scale on-demand data broadcast . . 846--860
              Steven H. Low and   
               David E. Lapsley   Optimization flow control, I: basic
                                  algorithm and convergence  . . . . . . . 861--874
                Lavy Libman and   
                     Ariel Orda   The designer's perspective to atomic
                                  noncooperative networks  . . . . . . . . 875--884
               Israel Cidon and   
                Raphael Rom and   
                  Yuval Shavitt   Analysis of multi-path routing . . . . . 885--896
                Wei K. Tsai and   
            John K. Antonio and   
                 Garng M. Huang   Complexity of gradient projection method
                                  for optimal routing in data networks . . 897--905
             Eyal Felstaine and   
                   Reuven Cohen   On the distribution of routing
                                  computation in hierarchical ATM networks 906--916
              Maan A. Kousa and   
          Ahmed K. Elhakeem and   
                       Hui Yang   Performance of ATM networks under hybrid
                                  ARQ/FEC error control scheme . . . . . . 917--925
                Hanoch Levy and   
           Tzippi Mendelson and   
                 Moshe Sidi and   
               Joseph Keren-Zvi   Sizing exit buffers in ATM networks: an
                                  intriguing coexistence of instability
                                  and tiny cell loss rates . . . . . . . . 926--936


IEEE\slash ACM Transactions on Networking
Volume 8, Number 1, February, 2000

               Dan Decasper and   
               Zubin Dittia and   
              Guru Parulkar and   
              Bernhard Plattner   Router plugins: a software architecture
                                  for next-generation routers  . . . . . . 2--15
             Chung Kei Wong and   
              Mohamed Gouda and   
                   Simon S. Lam   Secure group communications using key
                                  graphs . . . . . . . . . . . . . . . . . 16--30
                Mario Baldi and   
                 Yoram Ofek and   
              Bülent Yener   Adaptive group multicast with
                                  time-driven priority . . . . . . . . . . 31--43
              Sunghyun Choi and   
                   Kang G. Shin   A unified wireless LAN architecture for
                                  real-time and non-real-time
                                  communication services . . . . . . . . . 44--59
               Steve Iatrou and   
            Ioannis Stavrakakis   A dynamic regulation and scheduling
                                  scheme for real-time traffic management  60--70
                Nasir Ghani and   
                    Jon W. Mark   Enhanced distributed explicit rate
                                  allocation for ABR services in ATM
                                  networks . . . . . . . . . . . . . . . . 71--86
     Shivkumar Kalyanaraman and   
                   Raj Jain and   
                Sonia Fahmy and   
                Rohit Goyal and   
                Bobby Vandalore   The ERICA switch algorithm for ABR
                                  traffic management in ATM networks . . . 87--98
              Ching-Fong Su and   
             Gustavo De Veciana   Statistical multiplexing and
                                  mix-dependent alternative routing in
                                  multiservice VP networks . . . . . . . . 99--108
             Sung Hyuk Byun and   
                  Dan Keun Sung   The UniMIN switch architecture for
                                  large-scale ATM switches . . . . . . . . 109--120

IEEE\slash ACM Transactions on Networking
Volume 8, Number 2, 2000

            Jitendra Padhye and   
              Victor Firoiu and   
          Donald F. Towsley and   
                James F. Kurose   Modeling TCP Reno performance: a simple
                                  model and its empirical validation . . . 133--145
          Oliver Spatscheck and   
    Jòrgen S. Hansen and   
            John H. Hartman and   
              Larry L. Peterson   Optimizing TCP forwarder performance . . 146--157
                Luigi Rizzo and   
               Lorenzo Vicisano   Replacement policies for a proxy cache   158--170
    Ioannis Ch. Paschalidis and   
             John N. Tsitsiklis   Congestion-dependent pricing of network
                                  services . . . . . . . . . . . . . . . . 171--184
                 Ion Stoica and   
                  Hui Zhang and   
                T. S. Eugene Ng   A hierarchical fair service curve
                                  algorithm for link-sharing, real-time,
                                  and priority services  . . . . . . . . . 185--199
             Mark D. Corner and   
        Jörg Liebeherr and   
                Nada Golmie and   
        Chatschik Bisdikian and   
                    David H. Su   A priority scheme for the IEEE 802.14
                                  MAC protocol for hybrid fiber-coax
                                  networks . . . . . . . . . . . . . . . . 200--211
            Subir K. Biswas and   
                  Rauf Izmailov   Design of a fair bandwidth allocation
                                  policy for VBR traffic in ATM networks   212--212
           Martin S. Lacher and   
     Jörg Nonnenmacher and   
              Ernst W. Biersack   Performance comparison of centralized
                                  versus distributed error recovery for
                                  reliable multicast . . . . . . . . . . . 224--224
          Douglas S. Reeves and   
              Hussein F. Salama   A distributed algorithm for
                                  delay-constrained unicast routing  . . . 239--250
                Adrian Grah and   
                Terence D. Todd   Packet-switched local area networks
                                  using wavelength-selective station
                                  couplers . . . . . . . . . . . . . . . . 251--264
             Jean-Marc Berthaud   Time synchronization over networks using
                                  convex closures  . . . . . . . . . . . . 265--277

IEEE\slash ACM Transactions on Networking
Volume 8, Number 3, 2000

                     Li Fan and   
                    Pei Cao and   
            Jussara Almeida and   
               Andrei Z. Broder   Summary cache: a scalable wide-area Web
                                  cache sharing protocol . . . . . . . . . 281--293
         Sneha Kumar Kasera and   
Gísli Hjálmtýsson and   
          Donald F. Towsley and   
                James F. Kurose   Scalable reliable multicast using
                                  multiple multicast channels  . . . . . . 294--310
                Shiwen Chen and   
     Oktay Günlük and   
              Bülent Yener   The multicast packing problem  . . . . . 311--318
                     Jie Li and   
               Hisao Kameda and   
                       Keqin Li   Optimal dynamic mobility management for
                                  PCS networks . . . . . . . . . . . . . . 319--327
        Anthony S. Acampora and   
      Srikanth V. Krishnamurthy   A new adaptive MAC layer protocol for
                                  broadband packet wireless networks in
                                  harsh fading and interference
                                  environments . . . . . . . . . . . . . . 328--336
             Jeong Geun Kim and   
                Marwan M. Krunz   Bandwidth allocation in wireless
                                  networks with guaranteed packet-loss
                                  performance  . . . . . . . . . . . . . . 337--349
              Ching-Fong Su and   
         Gustavo De Veciana and   
                   Jean Walrand   Explicit rate flow control for ABR
                                  services in ATM networks . . . . . . . . 350--361
                Alain Mayer and   
                 Yoram Ofek and   
                      Moti Yung   Local and congestion-driven fairness
                                  algorithm in arbitrary topology networks 362--372
                  Steven H. Low   Equilibrium bandwidth and buffer
                                  allocations for elastic traffics . . . . 373--383
            Olivier Crochat and   
        Jean-Yves Le Boudec and   
                  Ornan Gerstel   Protection interoperability for WDM
                                  optical networks . . . . . . . . . . . . 384--395
              Biplab Sikdar and   
                   D. Manjunath   Queueing analysis of scheduling policies
                                  in copy networks of space-based
                                  multicast packet switches  . . . . . . . 396--406
            Rajgopal Kannan and   
                  Sibabrata Ray   MSXmin: a modular multicast ATM packet
                                  switch with low delay and hardware
                                  complexity . . . . . . . . . . . . . . . 407--418
            Eric W. M. Wong and   
            Andy K. M. Chan and   
            Tak-Shing Peter Yum   Analysis of rerouting in
                                  circuit-switched networks  . . . . . . . 419--427

IEEE\slash ACM Transactions on Networking
Volume 8, Number 4, 2000

               Zhi-Li Zhang and   
                Yuewei Wang and   
             David H. C. Du and   
                     Dongli Shu   Video staging: a proxy-server-based
                                  approach to end-to-end video delivery
                                  over wide-area networks  . . . . . . . . 429--442
             Michel Abdalla and   
              Yuval Shavitt and   
                   Avishai Wool   Key management for restricted multicast
                                  using broadcast encryption . . . . . . . 443--454
            Ellen W. Zegura and   
           Mostafa H. Ammar and   
               Zongming Fei and   
           Samrat Bhattacharjee   Application-layer anycasting: a server
                                  selection architecture and use in a
                                  replicated Web service . . . . . . . . . 455--466
            Matthew Roughan and   
              Darryl Veitch and   
                   Patrice Abry   Real-time estimation of the parameters
                                  of long-range dependence . . . . . . . . 467--478
                Mario Baldi and   
                     Yoram Ofek   End-to-end delay analysis of
                                  videoconferencing over packet-switched
                                  networks . . . . . . . . . . . . . . . . 479--492
                  Ilias Iliadis   Optimal PNNI complex node
                                  representations for restrictive costs
                                  and minimal path computation time  . . . 493--506
José M. Barceló and   
  Jorge García-Vidal and   
                    Olga Casals   Worst-case traffic in a tree network of
                                  ATM multiplexers . . . . . . . . . . . . 507--516
             Wen-Tsuen Chen and   
              Chun-Fu Huang and   
             Yi-Luang Chang and   
                  Wu-Yuin Hwang   An efficient cell-scheduling algorithm
                                  for multicast ATM switching systems  . . 517--525
             Dongsoo S. Kim and   
                    Ding-Zhu Du   Performance of split routing algorithm
                                  for three-stage multicast networks . . . 526--534
             Frank K. Hwang and   
              Sheng-Chyang Liaw   On nonblocking multicast three-stage
                                  Clos networks  . . . . . . . . . . . . . 535--539

IEEE\slash ACM Transactions on Networking
Volume 8, Number 5, 2000

             T. V. Lakshman and   
            Upamanyu Madhow and   
                 Bernhard Suter   TCP/IP performance with random loss and
                                  bidirectional congestion . . . . . . . . 541--555
               Jeonghoon Mo and   
                   Jean Walrand   Fair end-to-end window-based congestion
                                  control  . . . . . . . . . . . . . . . . 556--567
                P. Krishnan and   
                  Danny Raz and   
                  Yuval Shavitt   The cache location problem . . . . . . . 568--582
            Nicholas Bambos and   
               Shou C. Chen and   
              Gregory J. Pottie   Channel access algorithms with active
                                  link protection for wireless
                                  communication networks with power
                                  control  . . . . . . . . . . . . . . . . 583--597
         Dhritiman Banerjee and   
            Biswanath Mukherjee   Wavelength-routed optical networks:
                                  linear formulation, resource budgeting
                                  tradeoffs, and a reconfiguration study   598--607
                Xijun Zhang and   
                  Chunming Qiao   An effective and comprehensive approach
                                  for traffic grooming and wavelength
                                  assignment in SONET/WDM rings  . . . . . 608--617
              Ornan Gerstel and   
            Rajiv Ramaswami and   
                Galen H. Sasaki   Cost-effective traffic grooming in WDM
                                  rings  . . . . . . . . . . . . . . . . . 618--630
               Jason P. Jue and   
            Biswanath Mukherjee   Multiconfiguration multihop protocols: a
                                  new class of protocols for
                                  packet-switched WDM optical networks . . 631--642
           Arthur W. Berger and   
                   Yaakov Kogan   Dimensioning bandwidth for elastic
                                  traffic in high-speed data networks  . . 643--654
            Subir K. Biswas and   
              Rauf Izmailov and   
               Bhaskar Sengupta   Connection splitting: an efficient way
                                  of reducing call blocking in ATM . . . . 655--666
        Ha\"\ikel Ya\"\iche and   
           Ravi R. Mazumdar and   
            Catherine Rosenberg   A game theoretic framework for bandwidth
                                  allocation and pricing in broadband
                                  networks . . . . . . . . . . . . . . . . 667--678
           Chi-Chung Cheung and   
          Danny H. K. Tsang and   
                   Sanjay Gupta   Dynamic multicast routing based on mean
                                  number of new calls accepted before
                                  blocking for single rate loss networks   679--688

IEEE\slash ACM Transactions on Networking
Volume 8, Number 6, 2000

        Jean-Yves Le Boudec and   
             Olivier Verscheure   Optimal smoothing for guaranteed service 689--696
           Rose Qingyang Hu and   
                  David W. Petr   A predictive self-tuning fuzzy-logic
                                  feedback rate controller . . . . . . . . 697--709
               Michael Frey and   
               Son Nguyen-Quang   A gamma-based framework for modeling
                                  variable-rate MPEG video sources: the
                                  GOP GBAR model . . . . . . . . . . . . . 710--719
           Brett J. Vickers and   
   Célio Albuquerque and   
                   Tatsuya Suda   Source-adaptive multilayered multicast
                                  algorithms for real-time video
                                  distribution . . . . . . . . . . . . . . 720--733
       Paolo Narváez and   
              Kai-Yeung Siu and   
                  Hong-Yi Tzeng   New dynamic algorithms for shortest path
                                  tree computation . . . . . . . . . . . . 734--746
                 Yuhong Zhu and   
          George N. Rouskas and   
                Harry G. Perros   A path decomposition approach for
                                  computing blocking probabilities in
                                  wavelength-routing networks  . . . . . . 747--762
                  Eric Noel and   
                  K. Wendy Tang   Performance modeling of multihop network
                                  subject to uniform and nonuniform
                                  geometric traffic  . . . . . . . . . . . 763--774
               Reuven Cohen and   
                Gideon Kaempfer   On the cost of virtual private networks  775--784
          Frederico Cal\`\i and   
                Marco Conti and   
                 Enrico Gregori   Dynamic tuning of the IEEE 802.11
                                  protocol to achieve a theoretical
                                  throughput limit . . . . . . . . . . . . 785--799
           Milosh Ivanovich and   
             Moshe Zukerman and   
                 Fraser Cameron   A study of deadlock models for a
                                  multiservice medium access protocol
                                  employing a Slotted Aloha signalling
                                  channel  . . . . . . . . . . . . . . . . 800--811


IEEE\slash ACM Transactions on Networking
Volume 9, Number 1, 2001

         Gustavo De Veciana and   
      Takis Konstantopoulos and   
                    Tae-Jin Lee   Stability and performance analysis of
                                  networks supporting elastic services . . 2--14
       Santosh Paul Abraham and   
                   Anurag Kumar   A new approach for asynchronous
                                  distributed rate control of elastic
                                  sessions in integrated packet networks   15--30
                 Ikjun Yeom and   
          A. L. Narasimha Reddy   Modeling TCP behavior in a
                                  differentiated services network  . . . . 31--46
              Thierry Chich and   
          Pierre Fraigniaud and   
                  Johanne Cohen   Unslotted deflection routing: a
                                  practical and efficient protocol for
                                  multihop optical networks  . . . . . . . 47--59
                Guangzhi Li and   
                    Rahul Simha   On the wavelength assignment problem in
                                  multifiber WDM star and ring networks    60--68
                Faisal Shad and   
            Terence D. Todd and   
                Vytas Kezys and   
                     John Litva   Dynamic slot allocation (DSA) in indoor
                                  SDMA/TDMA using smart antenna
                                  basestation  . . . . . . . . . . . . . . 69--81
            Baruch Awerbuch and   
                  Yuval Shavitt   Topology aggregation for directed graphs 82--90
                Mario Gerla and   
            Emilio Leonardi and   
                 Fabio Neri and   
               Prasasth Palnati   Routing in the bidirectional shufflenet  91--103
            Emilio Leonardi and   
               Marco Mellia and   
                 Fabio Neri and   
            Marco Ajmone Marsan   On the stability of input-queued
                                  switches with speed-up . . . . . . . . . 104--118

IEEE\slash ACM Transactions on Networking
Volume 9, Number 2, 2001

             S.-H Gary Chan and   
                   Fouad Tobagi   Distributed servers architecture for
                                  networked video services . . . . . . . . 125--136
                Eylem Ekici and   
            Ian F. Akyildiz and   
              Michael D. Bender   A distributed routing algorithm for
                                  datagram traffic in LEO satellite
                                  networks . . . . . . . . . . . . . . . . 137--147
  Srikanth V. Krishnamurthy and   
        Anthony S. Acampora and   
                  Michele Zorzi   Polling-based media access protocols for
                                  use with smart adaptive array antennas   148--161
               Anees Shaikh and   
           Jennifer Rexford and   
                   Kang G. Shin   Evaluating the impact of stale link
                                  state on quality-of-service routing  . . 162--176
            Katsuyoshi Iida and   
             Tetsuya Takine and   
            Hideki Sunahara and   
                       Yuji Oie   Delay analysis for CBR traffic under
                                  static-priority scheduling . . . . . . . 177--185
     Rajesh M. Krishnaswamy and   
             Kumar N. Sivarajan   Design of logical topologies: a linear
                                  formulation for wavelength-routed
                                  optical networks with no wavelength
                                  changers . . . . . . . . . . . . . . . . 186--198
                 Jingyu Qiu and   
             Edward W. Knightly   Measurement-based admission control with
                                  aggregate traffic envelopes  . . . . . . 199--210
                Shahrokh Valaee   A recursive estimator of worst-case
                                  burstiness . . . . . . . . . . . . . . . 211--222

IEEE\slash ACM Transactions on Networking
Volume 9, Number 3, June, 2001

              Stefan Savage and   
            David Wetherall and   
                Anna Karlin and   
                   Tom Anderson   Network support for IP traceback . . . . 226--237
               Paul Barford and   
                  Mark Crovella   Critical path analysis of TCP
                                  transactions . . . . . . . . . . . . . . 238--248
        Mikkel Christiansen and   
               Kevin Jeffay and   
                  David Ott and   
              F. Donelson Smith   Tuning RED for Web traffic . . . . . . . 249--264
              Anja Feldmann and   
           Albert Greenberg and   
               Carsten Lund and   
              Nick Reingold and   
           Jennifer Rexford and   
                      Fred True   Deriving traffic demands for operational
                                  IP networks: methodology and experience  265--280
             N. G. Duffield and   
          Matthias Grossglauser   Trajectory sampling for direct traffic
                                  observation  . . . . . . . . . . . . . . 280--292
             Craig Labovitz and   
                 Abha Ahuja and   
               Abhijit Bose and   
                Farnam Jahanian   Delayed Internet routing convergence . . 293--306
            Ian F. Akyildiz and   
           Giacomo Morabito and   
                 Sergio Palazzo   TCP-Peach: a new congestion control
                                  scheme for satellite IP networks . . . . 307--321
                 Song Chong and   
                 Sangho Lee and   
                    Sungho Kang   A simple, scalable, and stable explicit
                                  rate allocation algorithm for MAX-MIN
                                  flow control with minimum rate guarantee 322--335
         Vincent W. S. Wong and   
              Mark E. Lewis and   
             Victor C. M. Leung   Stochastic control of path optimization
                                  for inter-switch handoffs in wireless
                                  ATM networks . . . . . . . . . . . . . . 336--350
                   J. Siwko and   
                       I. Rubin   Connection admission control for
                                  capacity-varying networks with
                                  stochastic capacity change times . . . . 351--360
                Hairong Sun and   
                 Xinyu Zang and   
              Kishor S. Trivedi   Performance of broadcast and unknown
                                  server (BUS) in ATM LAN emulation  . . . 361--372
                Verus Pronk and   
                      Jan Korst   Comments on ``Carry-over Round Robin: A
                                  Simple Cell Scheduling Mechanism for ATM
                                  networks'' . . . . . . . . . . . . . . . 373--373

IEEE\slash ACM Transactions on Networking
Volume 9, Number 4, August, 2001

          Sanjay Shakkottai and   
               Anurag Kumar and   
              Aditya Karnik and   
                   Ajit Anvekar   TCP performance over end-to-end rate
                                  control and stochastic available
                                  capacity . . . . . . . . . . . . . . . . 377--391
                Sally Floyd and   
                    Vern Paxson   Difficulties in simulating the Internet  392--403
            Pablo Rodriguez and   
          Christian Spanner and   
              Ernst W. Biersack   Analysis of Web caching architectures:
                                  hierarchical and distributed caching . . 404--418
            Ian F. Akyildiz and   
                 Inwhee Joe and   
               Henry Driver and   
                   Yung-Lung Ho   An adaptive FEC scheme for data traffic
                                  in wireless ATM networks . . . . . . . . 419--426
            Zygmunt J. Haas and   
               Marc R. Pearlman   The performance of query control schemes
                                  for the zone routing protocol  . . . . . 427--438
                Oran Sharon and   
                   Eitan Altman   An efficient polling MAC for wireless
                                  LANs . . . . . . . . . . . . . . . . . . 439--451
              Zhi-Ren Chang and   
                I-Chung Lee and   
          Cheng-Shang Chang and   
              Chien-Hsin Li and   
                     Ben-Li Sui   A novel scheme using the information of
                                  departure processes for delay guarantees
                                  of distributed VBR traffic . . . . . . . 452--463
              Arnaud Legout and   
     Jörg Nonnenmacher and   
              Ernst W. Biersack   Bandwidth-allocation policies for
                                  unicast and multicast flows  . . . . . . 464--478
          Shalabh Bhatnagar and   
              Michael C. Fu and   
           Steven I. Marcus and   
                 Pedram J. Fard   Optimal structured feedback policies for
                                  ABR flow control using two-timescale
                                  SPSA . . . . . . . . . . . . . . . . . . 479--491
             Yishay Mansour and   
               Boaz Patt-Shamir   Jitter control in QoS networks . . . . . 492--502
           Jonathan P. Lang and   
              Vishal Sharma and   
        Emmanouel A. Varvarigos   An analysis of oblivious and adaptive
                                  routing in optical networks with
                                  wavelength translation . . . . . . . . . 503--517
               Xiaojun Shen and   
                   Fan Yang and   
                         Yi Pan   Equivalent permutation capabilities
                                  between time-division optical omega
                                  networks and non-optical extra-stage
                                  omega networks . . . . . . . . . . . . . 518--524

IEEE\slash ACM Transactions on Networking
Volume 9, Number 5, October, 2001

               Paul Francis and   
                Sugih Jamin and   
                  Cheng Jin and   
                  Yixin Jin and   
                  Danny Raz and   
              Yuval Shavitt and   
                    Lixia Zhang   IDMaps: a global Internet host distance
                                  estimation service . . . . . . . . . . . 525--540
     Maurizio A. Bonuccelli and   
               M. Claudia Cl\`o   Scheduling of real-time messages in
                                  optical broadcast-and-select networks    541--552
                   G. Mohan and   
         C. Siva Ram Murthy and   
                 Arun K. Somani   Efficient algorithms for routing
                                  dependable connections in WDM optical
                                  networks . . . . . . . . . . . . . . . . 553--566
              Ayan Banerjee and   
            Ronald A. Iltis and   
        Emmanouel A. Varvarigos   Performance evaluation for a
                                  quasi-synchronous packet radio network
                                  (QSPNET) . . . . . . . . . . . . . . . . 567--577
                   Qiong Li and   
                 David L. Mills   Jitter-based delay-boundary prediction
                                  of wide-area networks  . . . . . . . . . 578--590
             Brahim Bensaou and   
          Danny H. K. Tsang and   
                 King Tung Chan   Credit-based fair queueing (CBFQ): a
                                  simple service-scheduling algorithm for
                                  packet-switched networks . . . . . . . . 591--604
           Vahid Tabatabaee and   
        Leonidas Georgiadis and   
             Leandros Tassiulas   QoS provisioning and tracking fluid
                                  policies in input queueing switches  . . 605--617
              Cory C. Beard and   
                Victor S. Frost   Prioritized resource allocation for
                                  stressed networks  . . . . . . . . . . . 618--633
                   Sheng Ma and   
                     Chuanyi Ji   Modeling heterogeneous network traffic
                                  in wavelet domain  . . . . . . . . . . . 634--649
    Manolis G. H. Katevenis and   
          Iakovos Mavroidis and   
        Georgios Sapountzis and   
            Eva Kalyvianaki and   
          Ioannis Mavroidis and   
           Georgios Glykopoulos   Wormhole IP over (connectionless) ATM    650--661
                  Yiu Kwok Tham   A unified algorithmic framework for
                                  variable-rate TDM switching assignments  662--668
     Efstratios Thomopoulos and   
            Louise E. Moser and   
         Peter M. Melliar-Smith   Latency analysis of the totem
                                  single-ring protocol . . . . . . . . . . 669--680

IEEE\slash ACM Transactions on Networking
Volume 9, Number 6, December, 2001

                  Lixin Gao and   
               Jennifer Rexford   Stable Internet routing without global
                                  coordination . . . . . . . . . . . . . . 681--692
                Yehuda Afek and   
          Anat Bremler-Barr and   
               Sariel Har-Peled   Routing with a clue  . . . . . . . . . . 693--705
       Paolo Narváez and   
              Kai-Yeung Siu and   
                  Hong-Yi Tzeng   New dynamic SPT algorithm based on a
                                  ball-and-string model  . . . . . . . . . 706--718
           Piet Van Mieghem and   
        Gerard Hooghiemstra and   
          Remco van der Hofstad   On the efficiency of multicast . . . . . 719--732
                      Lixin Gao   On inferring autonomous system
                                  relationships in the Internet  . . . . . 733--745
                 Weilian Su and   
                Ian F. Akyildiz   The jitter time-stamp approach for clock
                                  recovery of real-time variable bit-rate
                                  traffic  . . . . . . . . . . . . . . . . 746--754
                 Han S. Kim and   
                 Ness B. Shroff   Loss probability calculations and
                                  asymptotic analysis for finite buffer
                                  multiplexers . . . . . . . . . . . . . . 755--768
          Hannu Rummukainen and   
                  Jorma Virtamo   Polynomial cost approximations in Markov
                                  decision theory based call admission
                                  control  . . . . . . . . . . . . . . . . 769--779
         R. Radhakrishna Pillai   A distributed overload control algorithm
                                  for delay-bounded call setup . . . . . . 780--789
                Mingbo Xiao and   
             Ness B. Shroff and   
              Edwin K. P. Chong   Distributed admission control for
                                  power-controlled cellular wireless
                                  systems  . . . . . . . . . . . . . . . . 790--800
        Matthew K. H. Leung and   
             John C. S. Lui and   
                David K. Y. Yau   Adaptive proportional delay
                                  differentiated services:
                                  characterization and performance
                                  evaluation . . . . . . . . . . . . . . . 801--817
              Ramesh Johari and   
             David Kim Hong Tan   End-to-end congestion control for the
                                  Internet: delays and stability . . . . . 818--832
               James Begole and   
           Randall B. Smith and   
           Craig A. Struble and   
            Clifford A. Shaffer   Resource sharing for replicated
                                  synchronous groupware  . . . . . . . . . 833--843


IEEE\slash ACM Transactions on Networking
Volume 10, Number 1, February, 2002

               Mostafa H. Ammar   Editorial  . . . . . . . . . . . . . . . 1--1
                Erich Nahum and   
           Tsipora Barzilai and   
               Dilip D. Kandlur   Performance issues in WWW servers  . . . 2--11
      Constantinos Dovrolis and   
        Dimitrios Stiliadis and   
        Parameswaran Ramanathan   Proportional differentiated services:
                                  delay differentiation and packet
                                  scheduling . . . . . . . . . . . . . . . 12--26
           Martin Reisslein and   
              Keith W. Ross and   
             Srinivas Rajagopal   A framework for guaranteeing statistical
                                  QoS  . . . . . . . . . . . . . . . . . . 27--42
              Jorge Arturo Cobb   Preserving quality of service guarantees
                                  in spite of flow aggregation . . . . . . 43--53
                Shuqian Yan and   
         Michalis Faloutsos and   
                Anindo Banerjea   QoS-aware multicast routing for the
                                  Internet: the design and evaluation of
                                  QoSMIC . . . . . . . . . . . . . . . . . 54--66
                   Xi Zhang and   
               Kang G. Shin and   
              Debanjan Saha and   
               Dilip D. Kandlur   Scalable flow control for multicast ABR
                                  services in ATM networks . . . . . . . . 67--85
              Rung-Hung Gau and   
            Zygmunt J. Haas and   
         Bhaskar Krishnamachari   On multicast flow control for
                                  heterogeneous receivers  . . . . . . . . 86--101
             Dean H. Lorenz and   
                     Ariel Orda   Optimal partition of QoS requirements on
                                  unicast paths and multicast trees  . . . 102--114
                Aref Meddeb and   
        André Girard and   
            Catherine Rosenberg   The impact of point-to-multipoint
                                  traffic concentration on multirate
                                  networks design  . . . . . . . . . . . . 115--124
               Guoqiang Mao and   
                Daryoush Habibi   Loss performance analysis for
                                  heterogeneous \sc ON-OFF sources with
                                  application to connection admission
                                  control  . . . . . . . . . . . . . . . . 125--138
      Srivatsan Varadarajan and   
                Hung Q. Ngo and   
             Jaideep Srivastava   Error spreading: a perception-driven
                                  approach to handling error in continuous
                                  media streaming  . . . . . . . . . . . . 139--152
       Muriel Médard and   
           Richard A. Barry and   
             Steven G. Finn and   
                   Wenbo He and   
              Steven S. Lumetta   Generalized loop-back recovery in
                                  optical mesh networks  . . . . . . . . . 153--164

IEEE\slash ACM Transactions on Networking
Volume 10, Number 2, April, 2002

             Dan Rubenstein and   
                 Jim Kurose and   
                    Don Towsley   The impact of multicast layering on
                                  network fairness . . . . . . . . . . . . 169--182
                Eylem Ekici and   
            Ian F. Akyildiz and   
              Michael D. Bender   A multicast routing algorithm for LEO
                                  satellite IP networks  . . . . . . . . . 183--192
              Mark A. Smith and   
             K. K. Ramakrishnan   Formal specification and verification of
                                  safety and performance of TCP selective
                                  acknowledgment . . . . . . . . . . . . . 193--207
                 Xi-Ren Cao and   
              Hong-Xia Shen and   
             Rodolfo Milito and   
                  Patrica Wirth   Internet pricing with a game theoretical
                                  approach: concepts and examples  . . . . 208--216
     Costas A. Courcoubetis and   
            Antonis Dimakis and   
            George D. Stamoulis   Traffic equivalence and substitution in
                                  a multiplexer with applications to
                                  dynamic available capacity estimation    217--231
         Timothy G. Griffin and   
          F. Bruce Shepherd and   
                 Gordon Wilfong   The stable paths problem and interdomain
                                  routing  . . . . . . . . . . . . . . . . 232--243
                       Xin Yuan   Heuristic algorithms for
                                  multiconstrained quality-of-service
                                  routing  . . . . . . . . . . . . . . . . 244--256
                      Si Wu and   
         K. Y. Michael Wong and   
                          Bo Li   A dynamic call admission policy with
                                  precision QoS guarantee using stochastic
                                  control for mobile wireless networks . . 257--271
              Richard J. La and   
              Venkat Anantharam   Utility-based rate control in the
                                  Internet for elastic traffic . . . . . . 272--286
         Aleksandra Smiljani\'c   Flexible bandwidth allocation in
                                  high-capacity packet switches  . . . . . 287--293

IEEE\slash ACM Transactions on Networking
Volume 10, Number 3, June, 2002

             Suchitra Raman and   
          Hari Balakrishnan and   
              Murari Srinivasan   ITP: an Image Transport Protocol for the
                                  Internet . . . . . . . . . . . . . . . . 297--307
           Mohamed G. Gouda and   
    E. N. (Mootaz) Elnozahy and   
            Chin-Tser Huang and   
               Tommy M. McGuire   Hop integrity in computer networks . . . 308--319
   Laurent Massoulié and   
                  James Roberts   Bandwidth sharing: objectives and
                                  algorithms . . . . . . . . . . . . . . . 320--328
            Jean-Yves Le Boudec   Some properties of variable length
                                  packet shapers . . . . . . . . . . . . . 329--337
        Lampros Kalampoukas and   
               Anujan Varma and   
             K. K. Ramakrishnan   Explicit window adaptation: a method to
                                  enhance TCP performance  . . . . . . . . 338--350
            Ramu Ramamurthy and   
            Biswanath Mukherjee   Fixed-alternate routing and wavelength
                                  conversion in wavelength-routed optical
                                  networks . . . . . . . . . . . . . . . . 351--367
             Ellen L. Hahne and   
           Abhijit K. Choudhury   Dynamic queue length thresholds for
                                  multiple loss priorities . . . . . . . . 368--380
             Dan Rubenstein and   
                 Jim Kurose and   
                    Don Towsley   Detecting shared congestion of flows via
                                  end-to-end measurement . . . . . . . . . 381--395
        Ramachandran Ramjee and   
            Kannan Varadhan and   
            Luca Salgarelli and   
            Sandra R. Thuel and   
             Shie-Yuan Wang and   
                Thomas La Porta   HAWAII: a domain-based approach for
                                  supporting mobility in wide-area
                                  wireless networks  . . . . . . . . . . . 396--410
            Ian F. Akyildiz and   
                Eylem Ekici and   
              Michael D. Bender   MLSR: a novel routing algorithm for
                                  multilayered satellite IP networks . . . 411--424
    Ioannis Ch. Paschalidis and   
                       Yong Liu   Pricing in multiservice loss networks:
                                  static pricing, asymptotic optimality,
                                  and demand substitution effects  . . . . 425--438

IEEE\slash ACM Transactions on Networking
Volume 10, Number 4, August, 2002

       Konstantinos Psounis and   
               Balaji Prabhakar   Efficient randomized web-cache
                                  replacement schemes using samples from
                                  past eviction times  . . . . . . . . . . 441--455
            Pablo Rodriguez and   
              Ernst W. Biersack   Dynamic parallel access to replicated
                                  content in the Internet  . . . . . . . . 455--465
               Jack Brassil and   
            Henning Schulzrinne   Structuring Internet media streams with
                                  cueing protocols . . . . . . . . . . . . 466--476
      Matthias Grossglauser and   
                David N. C. Tse   Mobility increases the capacity of ad
                                  hoc wireless networks  . . . . . . . . . 477--486
       Elif Uysal-Biyikoglu and   
           Balaji Prabhakar and   
                 Abbas El Gamal   Energy-efficient packet transmission
                                  over a wireless link . . . . . . . . . . 487--499
        Augustin Chaintreau and   
   François Baccelli and   
                Christophe Diot   Impact of TCP-like congestion control on
                                  the throughput of multicast groups . . . 500--512
              Wu-chang Feng and   
               Kang G. Shin and   
           Dilip D. Kandlur and   
                  Debanjan Saha   The \sc BLUE active queue management
                                  algorithms . . . . . . . . . . . . . . . 513--528
          Jon C. R. Bennett and   
                Kent Benson and   
                Anna Charny and   
        William F. Courtney and   
            Jean-Yves Le Boudec   Delay jitter bounds and packet scale
                                  rate guarantee for expedited forwarding  529--540
João Luís Sobrinho   Algebra and algorithms for QoS path
                                  computation and hop-by-hop routing in
                                  the Internet . . . . . . . . . . . . . . 541--550
                Lavy Libman and   
                     Ariel Orda   Optimal retrial and timeout strategies
                                  for accessing network resources  . . . . 551--564
                 Amit Kumar and   
             Rajeev Rastogi and   
           Avi Silberschatz and   
                   Bulent Yener   Algorithms for provisioning virtual
                                  private networks in the hose model . . . 565--578
             Yann d'Halluin and   
           Peter A. Forsyth and   
              Kenneth R. Vetzal   Managing capacity for telecommunications
                                  networks under uncertainty . . . . . . . 579--587

IEEE\slash ACM Transactions on Networking
Volume 10, Number 5, October, 2002

               Jaeyeon Jung and   
                   Emil Sit and   
          Hari Balakrishnan and   
                  Robert Morris   DNS performance and the effectiveness of
                                  caching  . . . . . . . . . . . . . . . . 589--603
           Michael Mitzenmacher   Compressed bloom filters . . . . . . . . 604--612
         Roch Guérin and   
                     Ariel Orda   Computing shortest paths for any number
                                  of hops  . . . . . . . . . . . . . . . . 613--620
        Ran Libeskind-Hadas and   
                    Rami Melhem   Multicast routing and wavelength
                                  assignment in multihop optical networks  621--629
               Zoe Antoniou and   
            Ioannis Stavrakakis   An efficient deadline-credit-based
                                  transport scheme for prerecorded
                                  semisoft continuous media applications   630--643
           Franco Blanchini and   
            Renato Lo Cigno and   
                  Roberto Tempo   Robust rate control for integrated
                                  services packet networks . . . . . . . . 644--652
              Saad Mneimneh and   
              Vishal Sharma and   
                  Kai-Yeung Siu   Switching using parallel input-output
                                  queued switches with no speedup  . . . . 653--665
        Marco Ajmone Marsan and   
              Andrea Bianco and   
             Paolo Giaccone and   
            Emilio Leonardi and   
                     Fabio Neri   Packet-mode scheduling in input-queued
                                  cell-based switches  . . . . . . . . . . 666--678
             N. G. Duffield and   
                Pawan Goyal and   
           Albert Greenberg and   
              Partho Mishra and   
         K. K. Ramakrishnan and   
       Jacobus E. van der Merwe   Resource management with hoses:
                                  point-to-cloud services for virtual
                                  private networks . . . . . . . . . . . . 679--692
                  Young Lee and   
                  James M. Tien   Static and dynamic approaches to
                                  modeling end-to-end routing in
                                  circuit-switched networks  . . . . . . . 693--705

IEEE\slash ACM Transactions on Networking
Volume 10, Number 6, December, 2002

            Colleen Shannon and   
                David Moore and   
                   K. C. Claffy   Beyond folklore: observations on
                                  fragmented traffic . . . . . . . . . . . 709--720
            Alex C. Snoeren and   
            Craig Partridge and   
            Luis A. Sanchez and   
         Christine E. Jones and   
        Fabrice Tchakountio and   
           Beverly Schwartz and   
            Stephen T. Kent and   
             W. Timothy Strayer   Single-packet IP traceback . . . . . . . 721--734
      Evangelos P. Markatos and   
 Dionisios N. Pnevmatikatos and   
         Michail D. Flouris and   
        Manolis G. H. Katevenis   Web-conscious storage management for Web
                                  proxies  . . . . . . . . . . . . . . . . 735--748
             Yigal Bejerano and   
               Israel Cidon and   
            Joseph (Seffi) Naor   Efficient handoff rerouting algorithms:
                                  a competitive on-line algorithmic
                                  approach . . . . . . . . . . . . . . . . 749--760
        Francesco Lo Presti and   
             N. G. Duffield and   
               Joe Horowitz and   
                    Don Towsley   Multicast-based inference of
                                  network-internal delay distributions . . 761--775
                Chengzhi Li and   
             Edward W. Knightly   Coordinated multihop scheduling: a
                                  framework for end-to-end services  . . . 776--789
         Srihari Nelakuditi and   
               Zhi Li Zhang and   
              Rose P. Tsang and   
                 David H. C. Du   Adaptive proportional routing: a
                                  localized QoS routing approach . . . . . 790--804
          Cheng Shang Chang and   
               Rene L. Cruz and   
        Jean Yves Le Boudec and   
                 Patrick Thiran   A min,+ system theory for constrained
                                  traffic regulation and dynamic service
                                  guarantees . . . . . . . . . . . . . . . 805--817
        Leonidas Georgiadis and   
           Panos Georgatsos and   
        Konstantinos Floros and   
            Stelios Sartzetakis   Lexicographically optimal balanced
                                  networks . . . . . . . . . . . . . . . . 818--829
                   Eiji Oki and   
               Zhigang Jing and   
        Roberto Rojas-Cessa and   
               H. Jonathan Chao   Concurrent round-robin-based dispatching
                                  schemes for Clos-network switches  . . . 830--844


IEEE\slash ACM Transactions on Networking
Volume 11, Number 1, February, 2003

                  Mostafa Ammar   Editorial  . . . . . . . . . . . . . . . 1--1
   Chalermek Intanagonwiwat and   
            Ramesh Govindan and   
             Deborah Estrin and   
             John Heidemann and   
                    Fabio Silva   Directed diffusion for wireless sensor
                                  networking . . . . . . . . . . . . . . . 2--16
                 Ion Stoica and   
              Robert Morris and   
         David Liben-Nowell and   
            David R. Karger and   
          M. Frans Kaashoek and   
                Frank Dabek and   
              Hari Balakrishnan   Chord: a scalable peer-to-peer lookup
                                  protocol for Internet applications . . . 17--32
                 Ion Stoica and   
              Scott Shenker and   
                      Hui Zhang   \em Core-stateless fair queueing: a
                                  scalable architecture to approximate
                                  fair bandwidth allocations in high-speed
                                  networks . . . . . . . . . . . . . . . . 33--46
             Alfio Lombardo and   
              Giovanni Schembra   Performance evaluation of an
                                  adaptive-rate MPEG encoder matching
                                  intserv traffic constraints  . . . . . . 47--65
               Neil J. Keon and   
                G. Anandalingam   Optimal pricing for multiple services in
                                  telecommunications networks offering
                                  quality-of-service guarantees  . . . . . 66--80
      Krishna Phani Gummadi and   
  Madhavarapu Jnana Pradeep and   
             C. Siva Ram Murthy   An efficient primary-segmented backup
                                  scheme for dependable real-time
                                  communication in multihop networks . . . 81--94
                   Jiafu He and   
                Khosrow Sohraby   An extended combinatorial analysis
                                  framework for discrete-time queueing
                                  systems with general sources . . . . . . 95--110
              R. Srinivasan and   
                 Arun K. Somani   On achieving fairness and efficiency in
                                  high-speed shared medium access  . . . . 111--124
                  Qing Zhao and   
                      Lang Tong   A multiqueue service room MAC protocol
                                  for wireless networks with multipacket
                                  reception  . . . . . . . . . . . . . . . 125--137
           Michael J. Neely and   
              Eytan Modiano and   
               Charles E. Rohrs   Power allocation and routing in
                                  multibeam satellites with time-varying
                                  channels . . . . . . . . . . . . . . . . 138--152
         Robert C. Chalmers and   
              Kevin C. Almeroth   On the topology of multicast trees . . . 153--165
            Joshua Auerbach and   
                Madan Gopal and   
                Marc Kaplan and   
                    Shay Kutten   Multicast group membership management    166--175

IEEE\slash ACM Transactions on Networking
Volume 11, Number 2, April, 2003

             Rajeev Rastogi and   
             Yuri Breitbart and   
          Minos Garofalakis and   
                     Amit Kumar   Optimal configuration of OSPF aggregates 181--194
            Anirban Mahanti and   
             Derek L. Eager and   
             Mary K. Vernon and   
       David J. Sundaram-Stukel   Scalable on-demand media streaming with
                                  packet loss recovery . . . . . . . . . . 195--209
                Mingbo Xiao and   
             Ness B. Shroff and   
              Edwin K. P. Chong   A utility-based power-control scheme in
                                  wireless cellular systems  . . . . . . . 210--221
               Do Young Eun and   
                 Ness B. Shroff   A measurement-analytic approach for QoS
                                  estimation in a network based on the
                                  dominant time scale  . . . . . . . . . . 222--235
Aysegül Gençata and   
            Biswanath Mukherjee   Virtual-topology adaptation for WDM mesh
                                  networks under dynamic traffic . . . . . 236--247
                   Hui Zang and   
                  Canhui Ou and   
            Biswanath Mukherjee   Path-protection routing and wavelength
                                  assignment (RWA) in WDM mesh networks
                                  under duct-layer constraints . . . . . . 248--258
         Asuman E. Ozdaglar and   
           Dimitri P. Bertsekas   Routing and wavelength assignment in
                                  optical networks . . . . . . . . . . . . 259--272
                   Kayi Lee and   
                  Kai-Yeung Siu   On the reconfigurability of single-hub
                                  WDM ring networks  . . . . . . . . . . . 273--284
                Hongyue Zhu and   
                   Hui Zang and   
                  Keyao Zhu and   
            Biswanath Mukherjee   A novel generic graph model for traffic
                                  grooming in heterogeneous WDM mesh
                                  networks . . . . . . . . . . . . . . . . 285--299
             Michael Dahlin and   
Bharat Baddepudi V. Chandra and   
                    Lei Gao and   
                    Amol Nayate   End-to-end WAN service availability  . . 300--313
                Sundar Iyer and   
                Nick W. McKeown   Analysis of the parallel packet switch
                                  architecture . . . . . . . . . . . . . . 314--324
               Man Chi Chan and   
                    Tony T. Lee   Statistical performance guarantees in
                                  large-scale cross-path packet switch . . 325--337
              Andrzej Karbowski   Comments on ``Optimization flow control,
                                  I: Basic algorithm and convergence'' . . 338--339

IEEE\slash ACM Transactions on Networking
Volume 11, Number 3, June, 2003

                Shudong Jin and   
                  Liang Guo and   
              Ibrahim Matta and   
                 Azer Bestavros   A spectrum of TCP-friendly window-based
                                  congestion control algorithms  . . . . . 341--355
                 Jim Martin and   
               Arne Nilsson and   
                    Injong Rhee   Delay-based congestion avoidance for TCP 356--369
               Farooq Anjum and   
             Leandros Tassiulas   Comparative study of various TCP
                                  versions over a wireless link with
                                  correlated losses  . . . . . . . . . . . 370--383
             Turgay Korkmaz and   
                   Marwan Krunz   Bandwidth-delay constrained path
                                  selection under inaccurate state
                                  information  . . . . . . . . . . . . . . 384--398
            Murali Kodialam and   
                 T. V. Lakshman   Dynamic routing of restorable
                                  bandwidth-guaranteed tunnels using
                                  aggregated network resource usage
                                  information  . . . . . . . . . . . . . . 399--410
          David Starobinski and   
             Mark Karpovsky and   
               Lev A. Zakrevski   Application of network calculus to
                                  general topologies using
                                  turn-prohibition . . . . . . . . . . . . 411--421
                 Huirong Fu and   
             Edward W. Knightly   A simple model of real-time flow
                                  aggregation  . . . . . . . . . . . . . . 422--435
                   Xi Zhang and   
                   Kang G. Shin   Delay analysis of
                                  feedback-synchronization signaling for
                                  multicast flow control . . . . . . . . . 436--450
                Mario Baldi and   
                     Yoram Ofek   A comparison of ring and tree embedding
                                  for real-time group multicast  . . . . . 451--464
        Marco Ajmone Marsan and   
              Andrea Bianco and   
             Paolo Giaccone and   
            Emilio Leonardi and   
                     Fabio Neri   Multicast traffic in input-queued
                                  switches: optimal scheduling and maximum
                                  throughput . . . . . . . . . . . . . . . 465--477
                Hakyong Kim and   
                     Kiseon Kim   Performance analysis of the multiple
                                  input-queued packet switch with the
                                  restricted rule  . . . . . . . . . . . . 478--487
                Alvin C. Fu and   
              Eytan Modiano and   
             John N. Tsitsiklis   Optimal energy allocation and admission
                                  control for communications satellites    488--500
           Andrea Fumagalli and   
           Isabella Cerutti and   
                    Marco Tacca   Optimal design of survivable mesh
                                  networks based on line switched WDM
                                  self-healing rings . . . . . . . . . . . 501--512

IEEE\slash ACM Transactions on Networking
Volume 11, Number 4, August, 2003

                Ellen W. Zegura   Editorial  . . . . . . . . . . . . . . . 513--513
            Georgos Siganos and   
         Michalis Faloutsos and   
           Petros Faloutsos and   
             Christos Faloutsos   Power laws and the AS-level Internet
                                  topology . . . . . . . . . . . . . . . . 514--524
                  Steven H. Low   A duality model of TCP and queue
                                  management algorithms  . . . . . . . . . 525--536
                Manish Jain and   
          Constantinos Dovrolis   End-to-end available bandwidth:
                                  measurement methodology, dynamics, and
                                  relation with TCP throughput . . . . . . 537--549
      Matthias Grossglauser and   
                David N. C. Tse   A time-scale decomposition approach to
                                  measurement-based admission control  . . 550--563
            Dmitri Loguinov and   
                   Hayder Radha   End-to-end rate-based congestion
                                  control: convergence properties and
                                  scalability analysis . . . . . . . . . . 564--577
                 Ariel Orda and   
            Alexander Sprintson   Precomputation schemes for QoS routing   578--591
          Hemant M. Chaskar and   
                Upamanyu Madhow   Fair scheduling with tunable latency: a
                                  round-robin approach . . . . . . . . . . 592--601
             John N. Daigle and   
Marcos Nascimento Magalhães   Analysis of packet networks having
                                  contention-based reservation with
                                  application to GPRS  . . . . . . . . . . 602--615
        Roberto Rojas-Cessa and   
                   Eiji Oki and   
               H. Jonathan Chao   Concurrent fault detection for a
                                  multiple-plane packet switch . . . . . . 616--627
         Mihail L. Sichitiu and   
             Peter H. Bauer and   
               Kamal Premaratne   The effect of uncertain time-variant
                                  delays in ATM networks with explicit
                                  rate feedback: a control theoretic
                                  approach . . . . . . . . . . . . . . . . 628--637
            Uttam K. Sarkar and   
   Subramanian Ramakrishnan and   
                   Dilip Sarkar   Modeling full-length video using
                                  Markov-modulated Gamma-based framework   638--649
               Sartaj Sahni and   
                    Kun Suk Kim   Efficient construction of multibit tries
                                  for IP lookup  . . . . . . . . . . . . . 650--662
           Mohamed G. Gouda and   
                Marco Schneider   Maximizable routing metrics  . . . . . . 663--675
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Online multicast routing with bandwidth
                                  guarantees: a new approach using
                                  multicast network flow . . . . . . . . . 676--686

IEEE\slash ACM Transactions on Networking
Volume 11, Number 5, October, 2003

         Srisankar Kunniyur and   
                     R. Srikant   End-to-end congestion control schemes:
                                  utility functions, random losses and ECN
                                  marks  . . . . . . . . . . . . . . . . . 689--702
                   Song Cen and   
           Pamela C. Cosman and   
            Geoffrey M. Voelker   End-to-end differentiation of congestion
                                  and wireless losses  . . . . . . . . . . 703--717
                  Ben Liang and   
                Zygmunt J. Haas   Predictive distance-based mobility
                                  management for multidimensional PCS
                                  networks . . . . . . . . . . . . . . . . 718--732
                  Peter Marbach   Priority service and max-min fairness    733--746
      Athina P. Markopoulou and   
            Fouad A. Tobagi and   
               Mansour J. Karam   Assessing the quality of voice
                                  communications over Internet backbones   747--760
                Guangzhi Li and   
               Dongmei Wang and   
           Charles Kalmanek and   
              Robert Doverspike   Efficient distributed restoration path
                                  selection for shared mesh restoration    761--771
                Koushik Kar and   
            Murali Kodialam and   
                 T. V. Lakshman   Routing restorable bandwidth guaranteed
                                  connections using maximum $2$-route
                                  flows  . . . . . . . . . . . . . . . . . 772--781
               Ralf Koetter and   
           Muriel Médard   An algebraic approach to network coding  782--795
           Mariusz A. Fecko and   
          M. Ümit Uyar and   
               Ali Y. Duale and   
                   Paul D. Amer   A technique to generate feasible tests
                                  for communications systems with multiple
                                  timers . . . . . . . . . . . . . . . . . 796--809
        Jean-Yves Le Boudec and   
                    Anna Charny   Packet scale rate guarantee for non-FIFO
                                  nodes  . . . . . . . . . . . . . . . . . 810--820
                  Sem Borst and   
             Michel Mandjes and   
             Miranda van Uitert   Generalized processor sharing with
                                  light-tailed and heavy-tailed input  . . 821--834
               Brian Towles and   
               William J. Dally   Guaranteed scheduling for switches with
                                  configuration overhead . . . . . . . . . 835--847
            Matthew Andrews and   
                     Lisa Zhang   Achieving stability in networks of
                                  input-queued switches  . . . . . . . . . 848--857
              Saad Mneimneh and   
                  Kai-Yeung Siu   On achieving throughput in an
                                  input-queued switch  . . . . . . . . . . 858--867

IEEE\slash ACM Transactions on Networking
Volume 11, Number 6, December, 2003

                   Ellen Zegura   Editorial  . . . . . . . . . . . . . . . 869--869
               Zhenhai Duan and   
               Zhi-Li Zhang and   
               Yiwei Thomas Hou   Service overlay networks: SLAs, QoS, and
                                  bandwidth provisioning . . . . . . . . . 870--883
                  Lixin Gao and   
               Zhi-Li Zhang and   
                    Don Towsley   Proxy-assisted techniques for delivering
                                  continuous multimedia streams  . . . . . 884--894
     Supratik Bhattacharyya and   
            James F. Kurose and   
                Don Towsley and   
               Ramesh Nagarajan   Efficient rate-controlled bulk data
                                  transfer using multiple multicast groups 895--907
             X. Brian Zhang and   
               Simon S. Lam and   
             Dong-Young Lee and   
                Y. Richard Yang   Protocol design for scalable and
                                  reliable group rekeying  . . . . . . . . 908--922
                 Mark Karol and   
    S. Jamaloddin Golestani and   
                      David Lee   Prevention of deadlocks and livelocks in
                                  lossless backpressured packet networks   923--934
          Tapan Kumar Nayak and   
             Kumar N. Sivarajan   Dimensioning optical networks under
                                  traffic growth models  . . . . . . . . . 935--947
           Daniel P. Heyman and   
                David Lucantoni   Modeling multiple IP traffic streams
                                  with rate limits . . . . . . . . . . . . 948--958
              Biplab Sikdar and   
     Shivkumar Kalyanaraman and   
             Kenneth S. Vastola   Analytic models for the latency and
                                  steady-state throughput of TCP Tahoe,
                                  Reno, and SACK . . . . . . . . . . . . . 959--971
          Sanjay Shakkottai and   
                 R. Srikant and   
                   Sean P. Meyn   Bounds on the throughput of congestion
                                  controllers in the presence of feedback
                                  delay  . . . . . . . . . . . . . . . . . 972--981
             Xiaohong Jiang and   
                  Hong Shen and   
Md. Mamun-ur-Rashid Khandker and   
               Susumu Horiguchi   Blocking behaviors of crosstalk-free
                                  optical Banyan networks on vertical
                                  stacking . . . . . . . . . . . . . . . . 982--993
             Peng-Yong Kong and   
            Kee-Chaing Chua and   
                 Brahim Bensaou   A novel scheduling scheme to share
                                  dropping ratio while guaranteeing a
                                  delay bound in a multiCode-CDMA network  994--1006


IEEE\slash ACM Transactions on Networking
Volume 12, Number 1, February, 2004

                   Ellen Zegura   Editorial  . . . . . . . . . . . . . . . 1--1
                Neil Spring and   
              Ratul Mahajan and   
            David Wetherall and   
                Thomas Anderson   Measuring ISP topologies with rocketfuel 2--16
              King-Shan Lui and   
            Klara Nahrstedt and   
                   Shigang Chen   Routing with topology aggregation in
                                  delay-bandwidth sensitive networks . . . 17--29
                 Daniel Zappala   Alternate path routing for multicast . . 30--43
                Ahmed Helmy and   
              Sandeep Gupta and   
                 Deborah Estrin   The STRESS method for boundary-point
                                  performance analysis of end-to-end
                                  multicast timer-suppression mechanisms   44--58
               Admela Jukan and   
                  Gerald Franzl   Path selection methods with multiple
                                  constraints in service-guaranteed WDM
                                  networks . . . . . . . . . . . . . . . . 59--72
                 Pin-Han Ho and   
             Hussein T. Mouftah   Reconfiguration of spare capacity for
                                  MPLS-based recovery in the Internet
                                  backbone networks  . . . . . . . . . . . 73--84
          Violeta Gambiroza and   
                  Ping Yuan and   
              Laura Balzano and   
                 Yonghe Liu and   
              Steve Sheafor and   
                Edward Knightly   Design, analysis, and implementation of
                                  DVSR: a fair high-performance protocol
                                  for packet rings . . . . . . . . . . . . 85--102
                    Xudong Wang   Wide-band TD-CDMA MAC with minimum-power
                                  allocation and rate- and BER-scheduling
                                  for wireless multimedia networks . . . . 103--116
              Rung-Hung Gau and   
                Zygmunt J. Haas   Concurrent search of mobile users in
                                  cellular networks  . . . . . . . . . . . 117--130
                     Wei Li and   
                     Xiuli Chao   Modeling and performance evaluation of a
                                  cellular mobile network  . . . . . . . . 131--145
                   Zuji Mao and   
            Christos Douligeris   A distributed database architecture for
                                  global roaming in next-generation mobile
                                  networks . . . . . . . . . . . . . . . . 146--160
                 Dongyu Qiu and   
                 Ness B. Shroff   A predictive flow control scheme for
                                  efficient network utilization and QoS    161--172
   Célio Albuquerque and   
           Brett J. Vickers and   
                   Tatsuya Suda   Network border patrol: preventing
                                  congestion collapse and promoting
                                  fairness in the Internet . . . . . . . . 173--186
              Ben-Jye Chang and   
                 Ren-Hung Hwang   Performance analysis for hierarchical
                                  multirate loss networks  . . . . . . . . 187--199

IEEE\slash ACM Transactions on Networking
Volume 12, Number 2, April, 2004

                 Ion Stoica and   
              Daniel Adkins and   
             Shelley Zhuang and   
              Scott Shenker and   
                  Sonesh Surana   Internet indirection infrastructure  . . 205--218
             Subhabrata Sen and   
                       Jia Wang   Analyzing peer-to-peer traffic across
                                  large networks . . . . . . . . . . . . . 219--232
        James R. Challenger and   
               Paul Dantzig and   
               Arun Iyengar and   
         Mark S. Squillante and   
                       Li Zhang   Efficiently serving dynamic data at
                                  highly accessed Web sites  . . . . . . . 233--246
       Emmanuel Léty and   
           Thierry Turletti and   
       François Baccelli   SCORE: a scalable communication protocol
                                  for large-scale virtual environments . . 247--260
               David Watson and   
              Matthew Smart and   
            G. Robert Malan and   
                Farnam Jahanian   Protocol scrubbing: network security
                                  through transparent flow modification    261--273
               Supratim Deb and   
                     R. Srikant   Congestion control for fair resource
                                  allocation in networks with multicast
                                  flows  . . . . . . . . . . . . . . . . . 274--285
      Srisankar S. Kunniyur and   
                     R. Srikant   An adaptive virtual queue (AVQ)
                                  algorithm for active queue management    286--299
            Michele Garetto and   
            Renato Lo Cigno and   
                Michela Meo and   
            Marco Ajmone Marsan   Closed queueing network models of
                                  interacting long-lived TCP flows . . . . 300--311
                  Peter Marbach   Analysis of a static pricing scheme for
                                  priority services  . . . . . . . . . . . 312--325
             Shengquan Wang and   
                  Dong Xuan and   
           Riccardo Bettati and   
                       Wei Zhao   Providing absolute differentiated
                                  services for real-time applications in
                                  static-priority scheduling networks  . . 326--339
             Moses Charikar and   
                Joseph Naor and   
                Baruch Schieber   Resource optimization in QoS multicast
                                  routing of real-time multimedia  . . . . 340--348
         Shanchieh Jay Yang and   
             Gustavo De Veciana   Enhancing both network and user
                                  performance for networks supporting best
                                  effort traffic . . . . . . . . . . . . . 349--360
                Mingyan Liu and   
                  John S. Baras   Fixed point approximation for multirate
                                  multihop loss networks with
                                  state-dependent routing  . . . . . . . . 361--374
        Jeff R. K. Hartline and   
        Ran Libeskind-Hadas and   
            Kurt M. Dresner and   
           Ethan W. Drucker and   
                 Katrina J. Ray   Optimal virtual topologies for
                                  one-to-many communication in WDM paths
                                  and rings  . . . . . . . . . . . . . . . 375--383
           Ashwin Sridharan and   
             Kumar N. Sivarajan   Blocking in all-optical networks . . . . 384--397

IEEE\slash ACM Transactions on Networking
Volume 12, Number 3, June, 2004

             Yuri Breitbart and   
          Minos Garofalakis and   
                    Ben Jai and   
               Cliff Martin and   
             Rajeev Rastogi and   
               Avi Silberschatz   Topology discovery in heterogeneous IP
                                  networks: the \em NetInventory system    401--414
       Constantino M. Lagoa and   
                    Hao Che and   
         Bernardo A. Movsichoff   Adaptive control algorithms for
                                  decentralized optimal traffic
                                  engineering in the Internet  . . . . . . 415--428
         Raymond R.-F. Liao and   
             Andrew T. Campbell   Dynamic core provisioning for
                                  quantitative differentiated services . . 429--442
             Alfio Lombardo and   
           Giacomo Morabito and   
              Giovanni Schembra   A novel analytical framework compounding
                                  statistical traffic modeling and
                                  aggregate-level service curve
                                  disciplines: network performance and
                                  efficiency implications  . . . . . . . . 443--455
      Christos Papadopoulos and   
              Guru Parulkar and   
                George Varghese   Light-weight multicast services (LMS): a
                                  router-assisted scheme for reliable
                                  multicast  . . . . . . . . . . . . . . . 456--468
          Pavlin Radoslavov and   
      Christos Papadopoulos and   
            Ramesh Govindan and   
                 Deborah Estrin   A comparison of application-level and
                                  router-assisted hierarchical schemes for
                                  reliable multicast . . . . . . . . . . . 469--482
                  Danny Raz and   
              Yuval Shavitt and   
                    Lixia Zhang   Distributed council election . . . . . . 483--492
                     Wei Ye and   
             John Heidemann and   
                 Deborah Estrin   Medium access control with coordinated
                                  adaptive sleeping for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 493--506
               Peng-Jun Wan and   
     Gruia Cãlinescu and   
                    Chih-Wei Yi   Minimum-power multicast routing in
                                  static ad hoc wireless networks  . . . . 507--514
                   Feng Xie and   
          Joseph L. Hammond and   
             Daniel L. Noneaker   Steady-state analysis of a
                                  split-connection scheme for Internet
                                  access through a wireless terminal . . . 515--525
              Xiangdong Qin and   
                  Yuanyuan Yang   Multicast connection capacity of WDM
                                  switching networks with limited
                                  wavelength conversion  . . . . . . . . . 526--538
            Timothy Y. Chow and   
              Fabian Chudak and   
             Anthony M. Ffrench   Fast optical layer mesh protection using
                                  pre-cross-connected trails . . . . . . . 539--548
                   C. Y. Li and   
               P. K. A. Wai and   
                Victor O. K. Li   The decomposition of a blocking model
                                  for connection-oriented networks . . . . 549--558
              Yu-Chee Tseng and   
               Yu-Chi Chueh and   
                 Jang-Ping Sheu   Seamless channel transition for the
                                  staircase video broadcasting scheme  . . 559--571
               Yongtao Gong and   
                Peiyuan Lee and   
                       Wanyi Gu   Comments on ``Dynamic wavelength routing
                                  using congestion and neighborhood
                                  information''  . . . . . . . . . . . . . 572--572

IEEE\slash ACM Transactions on Networking
Volume 12, Number 4, August, 2004

           Vijay K. Gurbani and   
                    Xian-He Sun   Terminating telephony services on the
                                  Internet . . . . . . . . . . . . . . . . 571--581
               Hani Jamjoom and   
         Padmanabhan Pillai and   
                   Kang G. Shin   Resynchronization and controllability of
                                  bursty service requests  . . . . . . . . 582--594
               Prince Samar and   
           Marc R. Pearlman and   
                Zygmunt J. Haas   Independent zone routing: an adaptive
                                  hybrid routing framework for ad hoc
                                  wireless networks  . . . . . . . . . . . 595--608
             Jae-Hwan Chang and   
             Leandros Tassiulas   Maximum lifetime routing in wireless
                                  sensor networks  . . . . . . . . . . . . 609--619
            Natalija Vlajic and   
Charalambos D. Charalambous and   
             Dimitrios Makrakis   Performance aspects of data broadcast in
                                  wireless networks with user retrials . . 620--633
    Özgür B. Akan and   
                Ian F. Akyildiz   ARC: the analytical rate control scheme
                                  for real-time traffic in wireless
                                  networks . . . . . . . . . . . . . . . . 634--644
                  Yiu Kwok Tham   Scheduling satellite-switched
                                  time-division multiple access with
                                  general switching modes  . . . . . . . . 645--652
                    Yan Sun and   
                Wade Trappe and   
                  K. J. Ray Liu   A scalable multicast key management
                                  scheme for heterogeneous wireless
                                  networks . . . . . . . . . . . . . . . . 653--666
                   Xi Zhang and   
                   Kang G. Shin   Markov-chain modeling for multicast
                                  signaling delay analysis . . . . . . . . 667--680
            Luciano Lenzini and   
              Enzo Mingozzi and   
                  Giovanni Stea   Tradeoffs between low complexity, low
                                  latency, and fairness with deficit
                                  round-robin schedulers . . . . . . . . . 681--693
                    Ao Tang and   
               Jiantao Wang and   
                  Steven H. Low   Understanding CHOKe: throughput and
                                  spatial characteristics  . . . . . . . . 694--707
                 Zhili Zhao and   
             Swaroop Darbha and   
          A. L. Narasimha Reddy   A method for estimating the proportion
                                  of nonresponsive traffic at a router . . 708--718
                James Aweya and   
           Michel Ouellette and   
              Delfin Y. Montuno   Design and stability analysis of a rate
                                  control algorithm using the
                                  Routh--Hurwitz stability criterion . . . 719--732
   Jaudelice C. de Oliveira and   
           Caterina Scoglio and   
            Ian F. Akyildiz and   
                     George Uhl   New preemption policies for
                                  DiffServ-aware traffic engineering to
                                  minimize rerouting in MPLS networks  . . 733--745
                Hanoch Levy and   
           Tsippy Mendelson and   
                    Gilad Goren   Dynamic allocation of resources to
                                  virtual path agents  . . . . . . . . . . 746--758
           Lachlan L. H. Andrew   Fast simulation of wavelength continuous
                                  WDM networks . . . . . . . . . . . . . . 759--765

IEEE\slash ACM Transactions on Networking
Volume 12, Number 5, October, 2004

              John W. Byers and   
          Jeffrey Considine and   
       Michael Mitzenmacher and   
                 Stanislav Rost   Informed content delivery across
                                  adaptive overlay networks  . . . . . . . 767--780
         Ludmila Cherkasova and   
                   Minaxi Gupta   Analysis of enterprise media server
                                  workloads: access patterns, locality,
                                  content evolution, and rates of change   781--794
                Kamil Sarac and   
              Kevin C. Almeroth   Tracetree: a scalable mechanism to
                                  discover multicast tree topologies in
                                  the Internet . . . . . . . . . . . . . . 795--808
       Ma\lgorzata Steinder and   
             Adarshpal S. Sethi   Probabilistic fault localization in
                                  communication systems using belief
                                  networks . . . . . . . . . . . . . . . . 809--822
                Ruibing Hao and   
                  David Lee and   
            Rakesh K. Sinha and   
                 Nancy Griffeth   Integrated system interoperability
                                  testing with applications to VoIP  . . . 823--836
     Georgios Varsamopoulos and   
            Sandeep K. S. Gupta   Dynamically adapting registration areas
                                  to user mobility and call patterns for
                                  efficient location management in PCS
                                  networks . . . . . . . . . . . . . . . . 837--850
           Piet Van Mieghem and   
            Fernando A. Kuipers   Concepts of exact QoS routing algorithms 851--864
          Antonis Panagakis and   
          Nandita Dukkipati and   
        Ioannis Stavrakakis and   
                       Joy Kuri   Optimal call admission control on a
                                  single link with a GPS scheduler . . . . 865--878
             Taieb F. Znati and   
                    Rami Melhem   Node delay assignment strategies to
                                  support end-to-end delay requirements in
                                  heterogeneous networks . . . . . . . . . 879--892
           Dirceu Cavendish and   
                Mario Gerla and   
                Saverio Mascolo   A control theoretical approach to
                                  congestion control in packet networks    893--906
    Ioannis Ch. Paschalidis and   
            Spyridon Vassilaras   Importance sampling for the estimation
                                  of buffer overflow probabilities via
                                  trace-driven simulations . . . . . . . . 907--919
              Eric Bouillet and   
Jean-François Labourdette   Distributed computation of shared backup
                                  path in mesh optical networks using
                                  probabilistic methods  . . . . . . . . . 920--930
 Srinivasan Ramasubramanian and   
                 Arun K. Somani   Analysis of optical networks with
                                  heterogeneous grooming architectures . . 931--943
             Arun K. Somani and   
                  Mani Mina and   
                        Ling Li   On trading wavelengths with fibers: a
                                  cost-performance based study . . . . . . 944--951
          Cheng-Shang Chang and   
                       Zhen Liu   A bandwidth sharing theory for a large
                                  number of HTTP-like connections  . . . . 952--962

IEEE\slash ACM Transactions on Networking
Volume 12, Number 6, December, 2004

      Constantinos Dovrolis and   
    Parameswaran Ramanathan and   
                    David Moore   Packet-dispersion techniques and a
                                  capacity-estimation methodology  . . . . 963--977
             N. G. Duffield and   
            Francesco Lo Presti   Network tomography from measured
                                  end-to-end delay covariance  . . . . . . 978--992
              Yuval Shavitt and   
                   Tomer Tankel   Big-bang simulation for embedding
                                  network distances in Euclidean space . . 993--1006
         Michael Rabinovich and   
                       Hua Wang   DHTTP: an efficient and cache-friendly
                                  transfer protocol for the Web  . . . . . 1007--1020
            Ian F. Akyildiz and   
                     Wenye Wang   The predictive user mobility profile
                                  framework for wireless multimedia
                                  networks . . . . . . . . . . . . . . . . 1021--1035
             Hsiao-Hwa Chen and   
                   Wee-Teck Tea   Hierarchy schedule-sensing protocol for
                                  CDMA wireless data-centric networks with
                                  multiple packet collision and capture
                                  effect . . . . . . . . . . . . . . . . . 1036--1048
                 Haiyun Luo and   
                Jiejun Kong and   
              Petros Zerfos and   
                  Songwu Lu and   
                    Lixia Zhang   URSA: ubiquitous and robust access
                                  control for mobile ad hoc networks . . . 1049--1063
                 Yigal Bejerano   Efficient integration of multihop
                                  wireless and wired networks with QoS
                                  constraints  . . . . . . . . . . . . . . 1064--1078
               Priya Ranjan and   
               Eyad H. Abed and   
                  Richard J. La   Nonlinear instabilities in TCP-RED . . . 1079--1092
               Scott Jordan and   
               Kalpana Jogi and   
                Chunlin Shi and   
                   Ikhlaq Sidhu   The variation of optimal bandwidth and
                                  buffer allocation with the number of
                                  sources  . . . . . . . . . . . . . . . . 1093--1104
                 Pin-Han Ho and   
      János Tapolcai and   
                  Tibor Cinkler   Segment shared protection in mesh
                                  communications networks with bandwidth
                                  guaranteed tunnels . . . . . . . . . . . 1105--1118
               Hongsik Choi and   
         Suresh Subramaniam and   
                 Hyeong-Ah Choi   Loopback recovery from double-link
                                  failures in optical mesh networks  . . . 1119--1130
        Marco Ajmone Marsan and   
        Mirko Franceschinis and   
            Emilio Leonardi and   
                 Fabio Neri and   
             Alessandro Tarello   Underload instabilities in packet
                                  networks with flow schedulers  . . . . . 1131--1143
                 Chuanxiong Guo   SRR: an $O(1)$ time-complexity packet
                                  scheduler for flows in multiservice
                                  packet networks  . . . . . . . . . . . . 1144--1155
        Guillermo del Angel and   
               Terrence L. Fine   Optimal power and retransmission control
                                  policies for random access systems . . . 1156--1166


IEEE\slash ACM Transactions on Networking
Volume 13, Number 1, February, 2005

                Ellen W. Zegura   Editorial  . . . . . . . . . . . . . . . 1--1
            Florin Baboescu and   
                George Varghese   Scalable packet classification . . . . . 2--14
                     Jun Xu and   
              Richard J. Lipton   On fundamental tradeoffs between delay
                                  bounds and computational complexity in
                                  packet scheduling algorithms . . . . . . 15--28
            David K. Y. Yau and   
             John C. S. Lui and   
                 Feng Liang and   
                      Yeung Yam   Defending against distributed
                                  denial-of-service attacks with max-min
                                  fair server-centric router throttles . . 29--42
          Fernando Paganini and   
                Zhikui Wang and   
              John C. Doyle and   
                  Steven H. Low   Congestion control for high performance,
                                  stability, and fairness in general
                                  networks . . . . . . . . . . . . . . . . 43--56
                 Dongyu Qiu and   
                 Ness B. Shroff   Queueing properties of feedback flow
                                  control systems  . . . . . . . . . . . . 57--68
                   Yong Xia and   
             David Harrison and   
     Shivkumar Kalyanaraman and   
       Kishore Ramachandran and   
              Arvind Venkatesan   Accumulation-based congestion control    69--80
       Ashvin Lakshmikantha and   
            Carolyn L. Beck and   
                     R. Srikant   Robustness of real and virtual
                                  queue-based active queue management
                                  schemes  . . . . . . . . . . . . . . . . 81--93
        Andreas Pitsillides and   
             Petros Ioannou and   
              Marios Lestas and   
                Loukas Rossides   Adaptive nonlinear congestion controller
                                  for a differentiated-services framework  94--107
              Aditya Karnik and   
                   Anurag Kumar   Performance of TCP congestion control
                                  with explicit rate feedback  . . . . . . 108--120
             Saswati Sarkar and   
             Leandros Tassiulas   Fair distributed congestion control in
                                  multirate multicast networks . . . . . . 121--133
                Wade Trappe and   
                  Yuke Wang and   
                  K. J. Ray Liu   Resource-aware conference key
                                  establishment for heterogeneous networks 134--146
                      Li Li and   
          Joseph Y. Halpern and   
              Paramvir Bahl and   
                Yi-Min Wang and   
              Roger Wattenhofer   A cone-based distributed
                                  topology-control algorithm for wireless
                                  multi-hop networks . . . . . . . . . . . 147--159
               Guanglei Liu and   
                 Chuanyi Ji and   
             Vincent W. S. Chan   On the scalability of network management
                                  information for inter-domain light-path
                                  assessment . . . . . . . . . . . . . . . 160--172
                Li-Wei Chen and   
                  Eytan Modiano   Efficient routing and wavelength
                                  assignment for reconfigurable WDM ring
                                  networks with wavelength converters  . . 173--186
                   Kejie Lu and   
                 Gaoxi Xiao and   
                Imrich Chlamtac   Analysis of blocking probability for
                                  distributed lightpath establishment in
                                  WDM optical networks . . . . . . . . . . 187--197
                     Yu Liu and   
               David Tipper and   
      Peerapon Siripongwutikorn   Approximating optimal spare capacity
                                  allocation by successive survivable
                                  routing  . . . . . . . . . . . . . . . . 198--211

IEEE\slash ACM Transactions on Networking
Volume 13, Number 2, April, 2005

              Debasis Mitra and   
                     Qiong Wang   Stochastic traffic engineering for
                                  demand uncertainty and risk-aware
                                  network revenue management . . . . . . . 221--233
           Ashwin Sridharan and   
         Roch Guérin and   
                Christophe Diot   Achieving near-optimal traffic
                                  engineering solutions for current
                                  OSPF/IS-IS networks  . . . . . . . . . . 234--247
       Hervé Kerivin and   
                Dritan Nace and   
            Thi-Tuyet-Loan Pham   Design of capacitated survivable
                                  networks with a single facility  . . . . 248--261
             Giuseppe Ascia and   
           Vincenzo Catania and   
                  Daniela Panno   An evolutionary management scheme in
                                  high-performance packet switches . . . . 262--275
                Chengzhi Li and   
             Edward W. Knightly   Schedulability criterion and performance
                                  analysis of coordinated schedulers . . . 276--287
              Ossama Younis and   
                    Sonia Fahmy   FlowMate: scalable on-line flow
                                  clustering . . . . . . . . . . . . . . . 288--301
               Supratim Deb and   
            Ayalvadi Ganesh and   
                      Peter Key   Resource allocation between persistent
                                  and transient flows  . . . . . . . . . . 302--315
               Marco Mellia and   
                Michela Meo and   
                Claudio Casetti   TCP smart framing: a segmentation
                                  algorithm to reduce TCP latency  . . . . 316--329
         Nishanth R. Sastry and   
                   Simon S. Lam   CYRF: a theory of window-based unicast
                                  congestion control . . . . . . . . . . . 330--342
             Byung-Jae Kwak and   
               Nah-Oak Song and   
              Leonard E. Miller   Performance analysis of exponential
                                  backoff  . . . . . . . . . . . . . . . . 343--355
               Eitan Altman and   
     Konstantin Avrachenkov and   
                  Chadi Barakat   A stochastic model of TCP/IP with
                                  stationary random losses . . . . . . . . 356--369
                    Ying Xu and   
             Roch Guérin   Individual QoS versus aggregate QoS: a
                                  loss performance study . . . . . . . . . 370--383
                 Weilian Su and   
                Ian F. Akyildiz   Time-diffusion synchronization protocol
                                  for wireless sensor networks . . . . . . 384--397
               Taejoon Park and   
                   Kang G. Shin   Optimal tradeoffs for location-based
                                  routing in large-scale ad hoc networks   398--410
            Atilla Eryilmaz and   
                 R. Srikant and   
               James R. Perkins   Stable scheduling policies for fading
                                  wireless channels  . . . . . . . . . . . 411--424
             Olivier Dousse and   
   François Baccelli and   
                 Patrick Thiran   Impact of interferences on connectivity
                                  in ad hoc networks . . . . . . . . . . . 425--436
              Eric Bouillet and   
Jean-François Labourdette and   
            Ramu Ramamurthy and   
                  Sid Chaudhuri   Lightpath re-optimization in mesh
                                  optical networks . . . . . . . . . . . . 437--447
               Abel Dasylva and   
          Delfin Y. Montuno and   
                Prasad Kodaypak   Optimization of optical cross-connects
                                  with wave-mixing conversion  . . . . . . 448--458

IEEE\slash ACM Transactions on Networking
Volume 13, Number 3, June, 2005

                Ellen W. Zegura   Editorial  . . . . . . . . . . . . . . . 461--461
             David D. Clark and   
            John Wroclawski and   
           Karen R. Sollins and   
                  Robert Braden   Tussle in cyberspace: defining
                                  tomorrow's Internet  . . . . . . . . . . 462--475
                Bong-Jun Ko and   
                 Dan Rubenstein   Distributed self-stabilizing placement
                                  of replicated resources in emerging
                                  networks . . . . . . . . . . . . . . . . 476--487
              Wu-chang Feng and   
              Francis Chang and   
                Wu-chi Feng and   
               Jonathan Walpole   A traffic characterization of popular
                                  on-line games  . . . . . . . . . . . . . 488--500
             Dan Rubenstein and   
                    Sambit Sahu   Can unstructured P2P protocols survive
                                  flash crowds?  . . . . . . . . . . . . . 501--512
                   Hyuk Lim and   
            Jennifer C. Hou and   
                  Chong-Ho Choi   Constructing Internet coordinate system
                                  based on delay measurement . . . . . . . 513--525
               Do Young Eun and   
                 Ness B. Shroff   Network decomposition: theory and
                                  practice . . . . . . . . . . . . . . . . 526--539
     Homayoun Yousefi'zadeh and   
           Hamid Jafarkhani and   
                    Amir Habibi   Layered media multicast control (LMMC):
                                  rate allocation and partitioning . . . . 540--553
            Ian F. Akyildiz and   
    Özgür B. Akan and   
               Giacomo Morabito   A rate control scheme for adaptive
                                  real-time applications in IP networks
                                  with lossy links and long round trip
                                  times  . . . . . . . . . . . . . . . . . 554--567
           Milan Vojnovi\'c and   
            Jean-Yves Le Boudec   On the long-run behavior of
                                  equation-based rate control  . . . . . . 568--581
               Jiantao Wang and   
                     Lun Li and   
              Steven H. Low and   
                  John C. Doyle   Cross-layer optimization in TCP/IP
                                  networks . . . . . . . . . . . . . . . . 582--595
            Saâd Biaz and   
                Nitin H. Vaidya   ``De-randomizing'' congestion losses to
                                  improve TCP performance over
                                  wired-wireless networks  . . . . . . . . 596--608
                  Hongyi Wu and   
                 Chong Wang and   
                Nian-Feng Tzeng   Novel self-configurable positioning
                                  technique for multihop wireless networks 609--621
          Pierre T. Kabamba and   
          Semyon M. Meerkov and   
                 Choon Yik Tang   Ranking and adaptive ranking CDMA  . . . 622--635
                      Sem Borst   User-level performance of channel-aware
                                  scheduling algorithms in wireless data
                                  networks . . . . . . . . . . . . . . . . 636--647
             Yigal Bejerano and   
             Yuri Breitbart and   
                 Ariel Orda and   
             Rajeev Rastogi and   
            Alexander Sprintson   Algorithms for computing QoS paths with
                                  restoration  . . . . . . . . . . . . . . 648--661
        Anirban Chakrabarti and   
                   G. Manimaran   Reliability constrained routing in QoS
                                  networks . . . . . . . . . . . . . . . . 662--675
                   Xiang Yu and   
            Ian Li-Jin Thng and   
               Yuming Jiang and   
                  Chunming Qiao   Queueing processes in GPS and PGPS with
                                  LRD traffic inputs . . . . . . . . . . . 676--689
               Anindya Basu and   
                Girija Narlikar   Fast incremental updates for pipelined
                                  forwarding engines . . . . . . . . . . . 690--703
                Xiaowen Chu and   
                          Bo Li   Dynamic routing and wavelength
                                  assignment in the presence of wavelength
                                  conversion for all-optical networks  . . 704--715

IEEE\slash ACM Transactions on Networking
Volume 13, Number 4, August, 2005

        Fernando A. Kuipers and   
         Piet F. A. Van Mieghem   Conditions that impact the complexity of
                                  QoS routing  . . . . . . . . . . . . . . 717--730
      Nicholas F. Maxemchuk and   
              Iradj Ouveysi and   
                 Moshe Zukerman   A quantitative measure for
                                  telecommunications networks topology
                                  design . . . . . . . . . . . . . . . . . 731--742
                Yossi Chait and   
               C. V. Hollot and   
               Vishal Misra and   
                Don Towsley and   
             Honggang Zhang and   
                       Yong Cui   Throughput differentiation using
                                  coloring at the network edge and
                                  preferential marking at the core . . . . 743--754
            David E. Taylor and   
        Andreas Herkersdorf and   
        Andreas Döring and   
                  Gero Dittmann   Robust header compression (ROHC) in
                                  next-generation network processors . . . 755--768
   Mohammad J. Akhbarizadeh and   
                Mehrdad Nourani   Hardware-based IP routing using
                                  partitioned lookup table . . . . . . . . 769--781
             Yashar Ganjali and   
         Abtin Keshavarzian and   
                  Devavrat Shah   Cell switching versus packet switching
                                  in input-queued switches . . . . . . . . 782--789
               Weiguang Shi and   
            M. H. MacGregor and   
               Pawel Gburzynski   Load balancing for parallel forwarding   790--801
            Rama Sangireddy and   
         Natsuhiko Futamura and   
             Srinivas Aluru and   
                 Arun K. Somani   Scalable, memory efficient, high-speed
                                  IP lookup algorithms . . . . . . . . . . 802--812
                Xiaojun Lin and   
                 Ness B. Shroff   Simplification of network dynamics in
                                  large systems  . . . . . . . . . . . . . 813--826
               Jang-Won Lee and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Non-convex optimization and rate control
                                  for multi-class services in the Internet 827--840
   François Baccelli and   
                      Dohy Hong   Interaction of TCP flows as billiards    841--853
               Jang-Won Lee and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Downlink power allocation for
                                  multi-class wireless systems . . . . . . 854--867
            Murali Kodialam and   
              Thyaga Nandagopal   Characterizing achievable rates in
                                  multi-hop wireless mesh networks with
                                  orthogonal channels  . . . . . . . . . . 868--880
              Sushant Sinha and   
             C. Siva Ram Murthy   Information theoretic approach to
                                  traffic adaptive WDM networks  . . . . . 881--894
      Poompat Saengudomlert and   
           Eytan H. Modiano and   
             Robert G. Gallager   Dynamic wavelength assignment for WDM
                                  all-optical tree networks  . . . . . . . 895--905
Jean-François Labourdette and   
              Eric Bouillet and   
            Ramu Ramamurthy and   
        Ahmet A. Akyamaç   Fast approximate dimensioning and
                                  performance analysis of mesh optical
                                  networks . . . . . . . . . . . . . . . . 906--917
                    Lu Shen and   
                    Xi Yang and   
               Byrav Ramamurthy   Shared risk link group (SRLG)-diverse
                                  path provisioning under hybrid service
                                  level agreements in wavelength-routed
                                  optical mesh networks  . . . . . . . . . 918--931

IEEE\slash ACM Transactions on Networking
Volume 13, Number 5, October, 2005

              Nick Duffield and   
               Carsten Lund and   
                  Mikkel Thorup   Estimating flow distributions from
                                  sampled flow statistics  . . . . . . . . 933--946
                  Yin Zhang and   
            Matthew Roughan and   
               Carsten Lund and   
                David L. Donoho   Estimating point-to-point and
                                  point-to-multipoint traffic matrices: an
                                  information-theoretic approach . . . . . 947--960
               Cliff C. Zou and   
                 Weibo Gong and   
                Don Towsley and   
                      Lixin Gao   The monitoring and early detection of
                                  Internet Worms . . . . . . . . . . . . . 961--974
                   Rong Pan and   
           Balaji Prabhakar and   
       Konstantinos Psounis and   
                  Damon Wischik   SHRiNK: a method for enabling scaleable
                                  performance prediction and efficient
                                  network simulation . . . . . . . . . . . 975--988
                   Yuguang Fang   Modeling and performance analysis for
                                  wireless mobile networks: a new
                                  analytical approach  . . . . . . . . . . 989--1002
    Özgür B. Akan and   
                Ian F. Akyildiz   Event-to-sink reliable transport in
                                  wireless sensor networks . . . . . . . . 1003--1016
               Sarah Koskie and   
                    Zoran Gajic   A Nash game algorithm for SIR-based
                                  power control in $3$G wireless CDMA
                                  networks . . . . . . . . . . . . . . . . 1017--1026
               Clement Yuen and   
                  Peter Marbach   Price-based rate control in random
                                  access networks  . . . . . . . . . . . . 1027--1040
                Youngmi Jin and   
                 George Kesidis   Dynamics of usage-priced communication
                                  networks: the case of a single
                                  bottleneck resource  . . . . . . . . . . 1041--1053
                Yunkai Zhou and   
                   Harish Sethu   On achieving fairness in the joint
                                  allocation of processing and bandwidth
                                  resources: principles and algorithms . . 1054--1067
                   Shao Liu and   
              Tamer Ba\csar and   
                     R. Srikant   Exponential-RED: a stabilizing AQM
                                  scheme for low- and high-speed TCP
                                  protocols  . . . . . . . . . . . . . . . 1068--1081
                   Yu-Ping Tian   Stability analysis and design of the
                                  second-order congestion control for
                                  networks with heterogeneous delays . . . 1082--1093
                  Yair Amir and   
            Baruch Awerbuch and   
            Claudiu Danilov and   
               Jonathan Stanton   A cost-benefit flow control for reliable
                                  multicast and unicast in overlay
                                  networks . . . . . . . . . . . . . . . . 1094--1106
            Dmitri Loguinov and   
                 Juan Casas and   
                  Xiaoming Wang   Graph-theoretic analysis of structured
                                  peer-to-peer systems: routing distances
                                  and fault resilience . . . . . . . . . . 1107--1120
                  Hui Zhang and   
                Ashish Goel and   
                Ramesh Govindan   Improving lookup latency in distributed
                                  hash table systems using random sampling 1121--1134
                Xuehong Sun and   
            Sartaj K. Sahni and   
                Yiqiang Q. Zhao   Packet classification consuming small
                                  amount of memory . . . . . . . . . . . . 1135--1145
                 Ariel Orda and   
            Alexander Sprintson   A scalable approach to the partition of
                                  QoS requirements in unicast and
                                  multicast  . . . . . . . . . . . . . . . 1146--1159
João Luís Sobrinho   An algebraic theory of dynamic network
                                  routing  . . . . . . . . . . . . . . . . 1160--1173
        Stavroula Siachalou and   
            Leonidas Georgiadis   Algorithms for precomputing constrained
                                  widest paths and multicast trees . . . . 1174--1187
                    Wei Sun and   
                   Kang G. Shin   End-to-end delay bounds for traffic
                                  aggregates under guaranteed-rate
                                  scheduling algorithms  . . . . . . . . . 1188--1201

IEEE\slash ACM Transactions on Networking
Volume 13, Number 6, December, 2005

             David Alderson and   
                     Lun Li and   
           Walter Willinger and   
                  John C. Doyle   Understanding Internet topology:
                                  principles, models, and validation . . . 1205--1218
             Graham Cormode and   
               S. Muthukrishnan   What's new: Finding significant
                                  differences in network data streams  . . 1219--1232
                    Nan Jin and   
     Gayathri Venkitachalam and   
                   Scott Jordan   Dynamic congestion-based pricing of
                                  bandwidth and buffer . . . . . . . . . . 1233--1246
               Haining Wang and   
               Abhijit Bose and   
           Mohamed El-Gendy and   
                   Kang G. Shin   IP Easy-pass: a light-weight
                                  network-edge resource access control . . 1247--1260
               Tansu Alpcan and   
                    Tamer Basar   A globally stable adaptive congestion
                                  control scheme for Internet-style
                                  networks with delay  . . . . . . . . . . 1261--1274
               Steven Weber and   
             Gustavo De Veciana   Rate adaptive multimedia streams:
                                  optimization and admission control . . . 1275--1288
        Marco Ajmone Marsan and   
            Michele Garetto and   
             Paolo Giaccone and   
            Emilio Leonardi and   
       Enrico Schiattarella and   
             Alessandro Tarello   Using partial differential equations to
                                  model TCP mice and elephants in large IP
                                  networks . . . . . . . . . . . . . . . . 1289--1301
            Shengming Jiang and   
                 Dajiang He and   
                  Jianqiang Rao   A prediction-based link availability
                                  estimation for routing metrics in MANETs 1302--1312
                    Ning Li and   
                Jennifer C. Hou   Localized topology control algorithms
                                  for heterogeneous wireless networks  . . 1313--1324
              Peter Marbach and   
                       Ying Qiu   Cooperation in wireless ad hoc networks:
                                  a market-based approach  . . . . . . . . 1325--1338
        Seema Bandyopadhyay and   
             Qingjiang Tian and   
                Edward J. Coyle   Spatio-temporal sampling rates and
                                  energy efficiency in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1339--1352
                  Haibin Lu and   
                   Sartaj Sahni   Conflict detection and resolution in
                                  two-dimensional prefix router tables . . 1353--1363
             Isaac Keslassy and   
            Murali Kodialam and   
             T. V. Lakshman and   
            Dimitrios Stiliadis   On guaranteed smooth scheduling for
                                  input-queued switches  . . . . . . . . . 1364--1375
            Shahrokh Valaee and   
   Jean-Charles Grégoire   An estimator of regulator parameters in
                                  a stochastic setting . . . . . . . . . . 1376--1389
                     Tao Wu and   
                 Arun K. Somani   Cross-talk attack monitoring and
                                  localization in all-optical networks . . 1390--1401
                 Eric Rosenberg   Hierarchical topological network design  1402--1409
              Tzu-Lun Huang and   
                      D. T. Lee   Comments and an improvement on ``A
                                  distributed algorithm of delay-bounded
                                  multicast routing for multimedia
                                  applications in wide area networks'' . . 1410--1411


IEEE\slash ACM Transactions on Networking
Volume 14, Number 1, February, 2006

               Jang-Won Lee and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Joint resource allocation and
                                  base-station assignment for the downlink
                                  in CDMA networks . . . . . . . . . . . . 1--14
                Koushik Kar and   
       Ananth Krishnamurthy and   
                   Neeraj Jaggi   Dynamic node activation in networks of
                                  rechargeable sensors . . . . . . . . . . 15--26
            Zygmunt J. Haas and   
                     Tara Small   A new networking model for biological
                                  applications of ad hoc sensor networks   27--40
           Razvan Cristescu and   
   Baltasar Beferull-Lozano and   
            Martin Vetterli and   
              Roger Wattenhofer   Network correlated data gathering with
                                  explicit communication: NP-completeness
                                  and algorithms . . . . . . . . . . . . . 41--54
             Himanshu Gupta and   
              Zongheng Zhou and   
               Samir R. Das and   
                      Quinyi Gu   Connected sensor cover:
                                  self-organization of sensor networks for
                                  efficient query execution  . . . . . . . 55--67
               Nicolas Hohn and   
                  Darryl Veitch   Inverting sampled traffic  . . . . . . . 68--80
              John W. Byers and   
                 Gu-In Kwon and   
               Michael Luby and   
           Michael Mitzenmacher   Fine-grained layered multicast with
                                  STAIR  . . . . . . . . . . . . . . . . . 81--93
               Priya Ranjan and   
              Richard J. La and   
                   Eyad H. Abed   Global stability conditions for rate
                                  control with arbitrary communication
                                  delays . . . . . . . . . . . . . . . . . 94--107
Peerapol Tinnakornsrisuphap and   
                  Richard J. La   Asymptotic behavior of heterogeneous TCP
                                  flows and RED gateway  . . . . . . . . . 108--120
              Hyoung-Il Lee and   
                  Seung-Woo Seo   Matching output queueing with a multiple
                                  input/output-queued switch . . . . . . . 121--132
             Eveline Veloso and   
    Virgílio Almeida and   
          Wagner Meira, Jr. and   
             Azer Bestavros and   
                    Shudong Jin   A hierarchical characterization of a
                                  live streaming media workload  . . . . . 133--146
                   Dahai Xu and   
                  Yang Chen and   
                Yizhi Xiong and   
              Chunming Qiao and   
                         Xin He   On the complexity of and algorithms for
                                  finding the shortest path with a
                                  disjoint counterpart . . . . . . . . . . 147--158
           Andrea Fumagalli and   
                    Marco Tacca   Differentiated reliability (DiR) in
                                  wavelength division multiplexing rings   159--168
              Jianping Wang and   
               Xiangtong Qi and   
                      Biao Chen   Wavelength assignment for multicast in
                                  all-optical WDM networks with splitting
                                  constraints  . . . . . . . . . . . . . . 169--182
                 Ian Ferrel and   
             Adrian Mettler and   
              Edward Miller and   
            Ran Libeskind-Hadas   Virtual topologies for multicasting with
                                  multiple originators in WDM networks . . 183--190
              Hiroaki Harai and   
                Masayuki Murata   High-speed buffer management for 40
                                  Gb/s-based photonic packet switches  . . 191--204
                Hung Q. Ngo and   
                 Dazhen Pan and   
                  Chunming Qiao   Constructions and analyses of
                                  nonblocking WDM switches based on
                                  arrayed waveguide grating and limited
                                  wavelength conversion  . . . . . . . . . 205--217
                  Canhui Ou and   
    Laxman H. Sahasrabuddhe and   
                  Keyao Zhu and   
          Charles U. Martel and   
            Biswanath Mukherjee   Survivable virtual concatenation for
                                  data over SONET/SDH in optical transport
                                  networks . . . . . . . . . . . . . . . . 218--231

IEEE\slash ACM Transactions on Networking
Volume 14, Number 2, April, 2006

             Suman Banerjee and   
              Seungjoon Lee and   
        Bobby Bhattacharjee and   
             Aravind Srinivasan   Resilient multicast using overlays . . . 237--248
            Sergey Gorinsky and   
                 Sugat Jain and   
                Harrick Vin and   
                Yongguang Zhang   Design of multicast protocols robust
                                  against inflated subscription  . . . . . 249--262
          Patrick P. C. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   Distributed collaborative key agreement
                                  and authentication protocols for dynamic
                                  peer groups  . . . . . . . . . . . . . . 263--276
                Hanoch Levy and   
               Haim Zlatokrilov   The effect of packet dispersion on voice
                                  applications in IP networks  . . . . . . 277--288
             John Musacchio and   
                   Jean Walrand   WiFi access point pricing as a dynamic
                                  game . . . . . . . . . . . . . . . . . . 289--301
                Xiaojun Lin and   
                 Ness B. Shroff   The impact of imperfect scheduling on
                                  cross-layer congestion control in
                                  wireless networks  . . . . . . . . . . . 302--315
            Mehmet C. Vuran and   
                Ian F. Akyildiz   Spatial correlation-based collaborative
                                  medium access control in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 316--329
      Poompat Saengudomlert and   
              Eytan Modiano and   
             Robert G. Gallager   On-line routing and wavelength
                                  assignment for dynamic traffic in WDM
                                  ring and torus networks  . . . . . . . . 330--340
                Zvi Rosberg and   
             Andrew Zalesky and   
                 Moshe Zukerman   Packet delay in optical circuit-switched
                                  networks . . . . . . . . . . . . . . . . 341--354
                    Ao Tang and   
               Jiantao Wang and   
                  Steven H. Low   Counter-intuitive throughput behaviors
                                  in networks under end-to-end control . . 355--368
            Stephan Bohacek and   
           Joao P. Hespanha and   
                 Junsoo Lee and   
               Chansook Lim and   
                 Katia Obraczka   A new TCP for persistent packet
                                  reordering . . . . . . . . . . . . . . . 369--382
               Liangping Ma and   
          Kenneth E. Barner and   
                Gonzalo R. Arce   Statistical analysis of TCP's
                                  retransmission timeout algorithm . . . . 383--396
       Sarang Dharmapurikar and   
      Praveen Krishnamurthy and   
                David E. Taylor   Longest prefix matching using Bloom
                                  filters  . . . . . . . . . . . . . . . . 397--409
               Hani Jamjoom and   
                   Kang G. Shin   On the role and controllability of
                                  persistent clients in traffic aggregates 410--423
                  David Lee and   
               Dongluo Chen and   
                Ruibing Hao and   
          Raymond E. Miller and   
                Jianping Wu and   
                        Xia Yin   Network protocol system monitoring: a
                                  formal approach with passive testing . . 424--437
             Yigal Bejerano and   
              Mark A. Smith and   
        Joseph (Seffi) Naor and   
               Nicole Immorlica   Efficient location area planning for
                                  personal communication systems . . . . . 438--450
               Zesheng Chen and   
                    Tian Bu and   
              Mostafa Ammar and   
                    Don Towsley   Comments on ``Modeling TCP Reno
                                  performance: a simple model and its
                                  empirical validation'' . . . . . . . . . 451--453

IEEE\slash ACM Transactions on Networking
Volume 14, Number 3, 2006

      Matthias Grossglauser and   
                Martin Vetterli   Locating mobile nodes with EASE:
                                  learning efficient routes from encounter
                                  histories alone  . . . . . . . . . . . . 457--469
            Kin-Kwong Leung and   
                   Chi Wan Sung   An opportunistic power control algorithm
                                  for cellular network . . . . . . . . . . 470--478
            Zygmunt J. Haas and   
          Joseph Y. Halpern and   
                          Li Li   Gossip-based ad hoc routing  . . . . . . 479--491
      Guillermo Barrenetxea and   
   Baltasar Berefull-Lozano and   
                Martin Vetterli   Lattice networks: capacity limits,
                                  optimal routing, and queueing behavior   492--505
                   Xin Wang and   
            Henning Schulzrinne   Pricing network resources for adaptive
                                  applications . . . . . . . . . . . . . . 506--519
                Anish Arora and   
                  Hongwei Zhang   LSRP: local stabilization in shortest
                                  path routing . . . . . . . . . . . . . . 520--531
                Aman Shaikh and   
                 Rohit Dube and   
                   Anujan Varma   Avoiding instability during graceful
                                  shutdown of multiple OSPF routers  . . . 532--542
Luís Henrique M. K. Costa and   
                Serge Fdida and   
       Otto Carlos M. B. Duarte   Incremental service deployment using the
                                  hop-by-hop multicast routing protocol    543--556
                Danny Dolev and   
               Osnat Mokryn and   
                  Yuval Shavitt   On multicast trees: structure and size
                                  estimation . . . . . . . . . . . . . . . 557--567
         Ayalvadi J. Ganesh and   
               Peter B. Key and   
               Damien Polis and   
                     R. Srikant   Congestion notification and probing
                                  mechanisms for endpoint admission
                                  control  . . . . . . . . . . . . . . . . 568--578
                   Lei Ying and   
           Geir E. Dullerud and   
                     R. Srikant   Global stability of Internet congestion
                                  controllers with heterogeneous delays    579--591
         Richard W. Thommes and   
                 Mark J. Coates   Deterministic packet marking for
                                  time-varying congestion price estimation 592--602
              Ji-Cheol Moon and   
                  Byeong Gi Lee   Rate-adaptive snoop: a TCP enhancement
                                  scheme over rate-controlled lossy links  603--615
             Robert Shorten and   
               Fabian Wirth and   
                  Douglas Leith   A positive systems model of TCP-like
                                  congestion control: asymptotic results   616--629
                   Yuming Jiang   Per-domain packet scale rate guarantee
                                  for expedited forwarding . . . . . . . . 630--643
          Cheng-Shang Chang and   
              Duan-Shin Lee and   
                    Chi-Yao Yue   Providing guaranteed rate services in
                                  the load balanced Birkhoff--von Neumann
                                  switches . . . . . . . . . . . . . . . . 644--656
                   Yu Cheng and   
                  Weihua Zhuang   Dynamic inter-SLA resource sharing in
                                  path-oriented differentiated services
                                  networks . . . . . . . . . . . . . . . . 657--670

IEEE\slash ACM Transactions on Networking
Volume 14, Number SI, June, 2006

                   Ning Cai and   
                Mung Chiang and   
            Michelle Effros and   
               Ralf Koetter and   
       Muriel Médard and   
           Balaji Prabhakar and   
                 R. Srikant and   
                Don Towsley and   
               Raymond W. Yeung   Introduction to the special issue on
                                  networking and information theory  . . . 2285--2288
                   Feng Xue and   
                    P. R. Kumar   On the $ \theta $-coverage and
                                  connectivity of large random networks    2289--2299
               Florin Ciucu and   
             Almut Burchard and   
            Jörg Liebeherr   Scaling properties of statistical
                                  end-to-end bounds in the network
                                  calculus . . . . . . . . . . . . . . . . 2300--2312
            Liang-Liang Xie and   
                    P. R. Kumar   On the path-loss attenuation regime for
                                  positive cost and linear scaling of
                                  transport capacity in wireless networks  2313--2328
               Michael Katz and   
                  Shlomo Shamai   Relaying protocols for two colocated
                                  users  . . . . . . . . . . . . . . . . . 2329--2344
      Nicholas J. A. Harvey and   
           Robert Kleinberg and   
            April Rasala Lehman   On the capacity of information networks  2345--2364
          Randall Dougherty and   
             Chris Freiling and   
                  Kenneth Zeger   Unachievability of network coding
                                  capacity . . . . . . . . . . . . . . . . 2365--2372
                  Xijin Yan and   
                   Jun Yang and   
                     Zhen Zhang   An outer bound for multisource multisink
                                  network coding with minimum cost
                                  consideration  . . . . . . . . . . . . . 2373--2385
           Michael Langberg and   
        Alexander Sprintson and   
                 Jehoshua Bruck   The encoding complexity of network
                                  coding . . . . . . . . . . . . . . . . . 2386--2397
                  Yunnan Wu and   
                 Kamal Jain and   
                  Sun-Yuan Kung   A unification of network coding and
                                  tree-packing (routing) theorems  . . . . 2398--2409
            Chandra Chekuri and   
         Christina Fragouli and   
                 Emina Soljanin   On average throughput and alphabet size
                                  in network coding  . . . . . . . . . . . 2410--2424
          Niranjan Ratnakar and   
                 Gerhard Kramer   The multicast capacity of deterministic
                                  relay networks with no interference  . . 2425--2432
                  Xue-Bin Liang   Matrix games in the multicast networks:
                                  maximum information flows with network
                                  switching  . . . . . . . . . . . . . . . 2433--2466
                Zongpeng Li and   
                 Baochun Li and   
                    Lap Chi Lau   On achieving maximum multicast
                                  throughput in undirected networks  . . . 2467--2485
               Supratim Deb and   
       Muriel Médard and   
                Clifford Choute   Algebraic gossip: a network coding
                                  approach to optimal multiple rumor
                                  mongering  . . . . . . . . . . . . . . . 2486--2507
               Stephen Boyd and   
               Arpita Ghosh and   
           Balaji Prabhakar and   
                  Devavrat Shah   Randomized gossip algorithms . . . . . . 2508--2530
      Birsen Sirkeci-Mergen and   
             Anna Scaglione and   
             Gökhan Mergen   Asymptotic analysis of multistage
                                  cooperative broadcast in wireless
                                  networks . . . . . . . . . . . . . . . . 2531--2550
               Amin Shokrollahi   Raptor codes . . . . . . . . . . . . . . 2551--2567
             Abbas El Gamal and   
               James Mammen and   
           Balaji Prabhakar and   
                  Devavrat Shah   Optimal throughput-delay scaling in
                                  wireless networks: part I: the fluid
                                  model  . . . . . . . . . . . . . . . . . 2568--2592
                    Jie Luo and   
             Anthony Ephremides   On the throughput, capacity, and
                                  stability regions of random multiple
                                  access . . . . . . . . . . . . . . . . . 2593--2607
             Desmond S. Lun and   
          Niranjan Ratnakar and   
       Muriel Médard and   
               Ralf Koetter and   
            David R. Karger and   
                  Tracey Ho and   
                 Ebad Ahmed and   
                      Fang Zhao   Minimum-cost multicast over coded packet
                                  networks . . . . . . . . . . . . . . . . 2608--2623
              Marcin Sikora and   
        J. Nicholas Laneman and   
             Martin Haenggi and   
    Daniel J. Costello, Jr. and   
                 Thomas E. Fuja   Bandwidth- and power-efficient routing
                                  in linear wireless networks  . . . . . . 2624--2633
                 Gang Liang and   
                  Nina Taft and   
                         Bin Yu   A fast lightweight approach to
                                  origin-destination IP traffic estimation
                                  using partial measurements . . . . . . . 2634--2648
          Dragan Petrovi\'c and   
         Kannan Ramchandran and   
                     Jan Rabaey   Overcoming untuned radios in wireless
                                  networks with network coding . . . . . . 2649--2657
               Peng-Jun Wan and   
                    Chih-Wei Yi   Coverage by randomly deployed wireless
                                  sensor networks  . . . . . . . . . . . . 2658--2669
                 Saikat Ray and   
                    Wei Lai and   
        Ioannis Ch. Paschalidis   Statistical location detection with
                                  sensor networks  . . . . . . . . . . . . 2670--2683
        Leonidas Georgiadis and   
             Leandros Tassiulas   Optimal overload response in sensor
                                  networks . . . . . . . . . . . . . . . . 2684--2696
          Rajesh Sundaresan and   
            Sergio Verdú   Capacity of queues via point-process
                                  channels . . . . . . . . . . . . . . . . 2697--2709
              Omer Gurewitz and   
               Israel Cidon and   
                     Moshe Sidi   One-way delay estimation using
                                  network-wide measurements  . . . . . . . 2710--2724
                 An-Swol Hu and   
             Sergio D. Servetto   On the scalability of cooperative time
                                  synchronization in pulse-connected
                                  networks . . . . . . . . . . . . . . . . 2725--2748
          Steven A. Borbash and   
             Anthony Ephremides   The feasibility of matchings in a
                                  wireless network . . . . . . . . . . . . 2749--2755
             Olivier Dousse and   
      Massimo Franceschetti and   
                 Patrick Thiran   On the throughput scaling of wireless
                                  relay networks . . . . . . . . . . . . . 2756--2761
              Ashish Khisti and   
                   Uri Erez and   
             Gregory W. Wornell   Fundamental limits and scaling behavior
                                  of cooperative multicasting in wireless
                                  networks . . . . . . . . . . . . . . . . 2762--2770
      Sahand Haji Ali Ahmad and   
     Aleksandar Jovi\vci\'c and   
               Pramod Viswanath   On outer bounds to the capacity region
                                  of wireless networks . . . . . . . . . . 2770--2776
                Xiaojun Lin and   
              Gaurav Sharma and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Degenerate delay-capacity tradeoffs in
                                  ad-hoc networks with Brownian mobility   2777--2784
         Aditya Ramamoorthy and   
                 Kamal Jain and   
             Philip A. Chou and   
                Michelle Effros   Separating distributed source coding
                                  from network coding  . . . . . . . . . . 2785--2795
   Ángela I. Barbero and   
          Òyvind Ytrehus   Cycle-logical treatment for
                                  ``Cyclopathic'' networks . . . . . . . . 2795--2804
                 Kamal Jain and   
          Vijay V. Vazirani and   
                   Gideon Yuval   On the capacity of multiple unicast
                                  sessions in undirected graphs  . . . . . 2805--2809
      Alexandros G. Dimakis and   
          Vinod Prabhakaran and   
             Kannan Ramchandran   Decentralized erasure codes for
                                  distributed networked storage  . . . . . 2809--2816
           Razvan Cristescu and   
       Baltasar Beferull-Lozano   Lossy network correlated data gathering
                                  with high-resolution coding  . . . . . . 2817--2824
               Yitzhak Birk and   
                      Tomer Kol   Coding on demand by an informed source
                                  (ISCOD) for efficient broadcast of
                                  different supplemental data to caching
                                  clients  . . . . . . . . . . . . . . . . 2825--2830
      Massimo Franceschetti and   
                 Ronald Meester   Critical node lifetimes in random
                                  networks via the Chen-Stein method . . . 2831--2837
          Cheng-Shang Chang and   
               Yi-Ting Chen and   
                  Duan-Shin Lee   Constructions of optical FIFO queues . . 2838--2843

IEEE\slash ACM Transactions on Networking
Volume 14, Number 4, August, 2006

                    Don Towsley   Editorial  . . . . . . . . . . . . . . . 673--673
                   Ning Cai and   
                Mung Chiang and   
            Michelle Effros and   
               Ralf Koetter and   
       Muriel Médard and   
           Balaji Prabhakar and   
                 R. Srikant and   
                Don Towsley and   
               Raymond W. Yeung   Introduction to the special issue on
                                  networking and information theory  . . . 674--674
                    Don Towsley   Abstracts from the IEEE transactions on
                                  information theory, special issue, June
                                  2006 . . . . . . . . . . . . . . . . . . 675--682
      Aleksandar Kuzmanovic and   
             Edward W. Knightly   Low-rate TCP-targeted denial of service
                                  attacks and counter strategies . . . . . 683--696
              Nick Duffield and   
        Francesco Lo Presti and   
                Vern Paxson and   
                    Don Towsley   Network loss tomography using striped
                                  unicast probes . . . . . . . . . . . . . 697--710
            David Breitgand and   
                  Danny Raz and   
                  Yuval Shavitt   The traveling miser problem  . . . . . . 711--724
                   Lili Qiu and   
          Yang Richard Yang and   
                  Yin Zhang and   
                  Scott Shenker   On selfish routing in Internet-like
                                  environments . . . . . . . . . . . . . . 725--738
      Aleksandar Kuzmanovic and   
             Edward W. Knightly   TCP-LP: low-priority service via
                                  end-point congestion control . . . . . . 739--752
                   Jing Zhu and   
                  Sumit Roy and   
                     Jae H. Kim   Performance modelling of TCP
                                  enhancements in terrestrial-satellite
                                  hybrid networks  . . . . . . . . . . . . 753--766
                 Martin Karsten   Collected experience from implementing
                                  RSVP . . . . . . . . . . . . . . . . . . 767--778
                 Xinming He and   
      Christos Papadopoulos and   
              Pavlin Radoslavov   Incremental deployment strategies for
                                  router-assisted reliable multicast . . . 779--792
             Sunil Kulkarni and   
               Aravind Iyer and   
            Catherine Rosenberg   An address-light, integrated MAC and
                                  routing protocol for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 793--806
               Zi-Tsan Chou and   
              Ching-Chi Hsu and   
                  Shin-Neng Hsu   UPCF: a new point coordination function
                                  with QoS and power management for
                                  multimedia over wireless LANs  . . . . . 807--820
             Lih-feng Tsaur and   
                  Daniel C. Lee   Closed-loop architecture and protocols
                                  for rapid dynamic spreading gain
                                  adaptation in CDMA networks  . . . . . . 821--834
         Prasanna Chaporkar and   
             Saswati Sarkar and   
                   Rahul Shetty   Dynamic quorum policy for maximizing
                                  throughput in limited information
                                  multiparty MAC . . . . . . . . . . . . . 835--848
             Yigal Bejerano and   
              Randeep S. Bhatia   MiFi: a framework for fairness and QoS
                                  assurance for current IEEE 802.11
                                  networks with multiple access points . . 849--862
                  Kai Zheng and   
               Chengchen Hu and   
                 Hongbin Lu and   
                        Bin Liu   A TCAM-based distributed parallel IP
                                  lookup scheme and performance analysis   863--875
              Omer Gurewitz and   
               Israel Cidon and   
                     Moshe Sidi   Network classless time protocol based on
                                  clock offset optimization  . . . . . . . 876--888
               Hassan Naser and   
             Hussein T. Mouftah   A joint-ONU interval-based dynamic
                                  scheduling algorithm for Ethernet
                                  passive optical networks . . . . . . . . 889--899
          Daniel O. Awduche and   
                  Bijan Jabbari   Demand assigned capacity management
                                  (DACM) in IP over optical (IPO) networks 900--913
                Weifa Liang and   
                   Xiaojun Shen   A general approach for all-to-all
                                  routing in multihop WDM optical networks 914--923

IEEE\slash ACM Transactions on Networking
Volume 14, Number 5, October, 2006

             Cristian Estan and   
            George Varghese and   
                   Michael Fisk   Bitmap algorithms for counting active
                                  flows on high-speed links  . . . . . . . 925--937
                    Yung Yi and   
               Supratim Deb and   
              Sanjay Shakkottai   Time-scale decomposition and equivalent
                                  rate-based marking . . . . . . . . . . . 938--950
       Janardhan R. Iyengar and   
               Paul D. Amer and   
                Randall Stewart   Concurrent multipath transfer using SCTP
                                  multihoming over independent end-to-end
                                  paths  . . . . . . . . . . . . . . . . . 951--964
               Yaqing Huang and   
         Roch Guérin and   
                   Pranav Gupta   Supporting excess real-time traffic with
                                  active drop queue  . . . . . . . . . . . 965--977
           Richard T. B. Ma and   
              Sam C. M. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   Incentive and service differentiation in
                                  P2P networks: a game theoretic approach  978--991
      Patrick Maillé and   
                   Bruno Tuffin   Pricing the Internet with multibid
                                  auctions . . . . . . . . . . . . . . . . 992--1004
           Vinay J. Ribeiro and   
            Rudolf H. Riedi and   
            Richard G. Baraniuk   Multiscale queueing analysis . . . . . . 1005--1018
            Nedo Celandroni and   
              Franco Davoli and   
                Erina Ferro and   
                  Alberto Gotta   Long-lived TCP connections via
                                  satellite: cross-layer bandwidth
                                  allocation, pricing, and adaptive
                                  control  . . . . . . . . . . . . . . . . 1019--1030
                Tarik Taleb and   
                   Nei Kato and   
                Yoshiaki Nemoto   REFWA: an efficient and fair congestion
                                  control scheme for LEO satellite
                                  networks . . . . . . . . . . . . . . . . 1031--1044
           Pavan Nuggehalli and   
          Vikram Srinivasan and   
  Carla-Fabiana Chiasserini and   
                  Ramesh R. Rao   Efficient cache placement in multi-hop
                                  wireless networks  . . . . . . . . . . . 1045--1055
      Iordanis Koutsopoulos and   
             Leandros Tassiulas   Cross-layer adaptive techniques for
                                  throughput enhancement in wireless
                                  OFDM-based networks  . . . . . . . . . . 1056--1066
            Matthew Andrews and   
                     Lisa Zhang   Scheduling over nonstationary wireless
                                  channels with finite rate sets . . . . . 1067--1077
               Wee-Seng Soh and   
                   Hyong S. Kim   A predictive bandwidth reservation
                                  scheme using mobile positioning and road
                                  topology information . . . . . . . . . . 1078--1091
             Yigal Bejerano and   
                 Rajeev Rastogi   Robust monitoring of link delays and
                                  faults in IP networks  . . . . . . . . . 1092--1103
        Narendra K. Singhal and   
    Laxman H. Sahasrabuddhe and   
            Biswanath Mukherjee   Optimal multicasting of multiple
                                  light-trees of different bandwidth
                                  granularities in a WDM mesh network with
                                  sparse splitting capabilities  . . . . . 1104--1117
                Zvi Rosberg and   
             Andrew Zalesky and   
                  Hai L. Vu and   
                 Moshe Zukerman   Analysis of OBS networks with limited
                                  wavelength conversion  . . . . . . . . . 1118--1127
                 Yinian Mao and   
                    Yan Sun and   
                     Min Wu and   
                  K. J. Ray Liu   JET: dynamic join-exit-tree amortization
                                  and scheduling for contributory key
                                  management . . . . . . . . . . . . . . . 1128--1140
             Frank K. Hwang and   
                Wen-Dar Lin and   
                Vadim Lioubimov   On noninterruptive rearrangeable
                                  networks . . . . . . . . . . . . . . . . 1141--1149
      Guillermo Barrenetxea and   
   Baltasar Beferull-Lozano and   
                Martin Vetterli   Correction to `Lattice networks:
                                  Capacity limits, optimal routing, and
                                  queueing behavior' . . . . . . . . . . . 1150--1150

IEEE\slash ACM Transactions on Networking
Volume 14, Number 6, December, 2006

        Jean-Yves Le Boudec and   
                 Milan Vojnovic   The random trip model: stability,
                                  stationary regime, and perfect
                                  simulation . . . . . . . . . . . . . . . 1153--1166
                 Jerzy Konorski   A game-theoretic study of CSMA/CA under
                                  a backoff attack . . . . . . . . . . . . 1167--1178
             Chun-Ting Chou and   
               Kang G. Shin and   
                 Sai Shankar N.   Contention-based airtime usage control
                                  in multirate IEEE 802.11 wireless LANs   1179--1192
            David Applegate and   
                    Edith Cohen   Making routing robust to changing
                                  traffic demands: algorithms and
                                  evaluation . . . . . . . . . . . . . . . 1193--1206
               Eddie Kohler and   
                 Jinyang Li and   
                Vern Paxson and   
                  Scott Shenker   Observed structure of addresses in IP
                                  traffic  . . . . . . . . . . . . . . . . 1207--1218
                Bamba Gueye and   
              Artur Ziviani and   
              Mark Crovella and   
                    Serge Fdida   Constraint-based geolocation of Internet
                                  hosts  . . . . . . . . . . . . . . . . . 1219--1232
        Srinivas Shakkottai and   
                     R. Srikant   Economics of network pricing with
                                  multiple ISPs  . . . . . . . . . . . . . 1233--1245
               David X. Wei and   
                  Cheng Jin and   
              Steven H. Low and   
                   Sanjay Hegde   FAST TCP: motivation, architecture,
                                  algorithms, performance  . . . . . . . . 1246--1259
              Huaizhong Han and   
        Srinivas Shakkottai and   
               C. V. Hollot and   
                 R. Srikant and   
                    Don Towsley   Multi-path TCP: a joint congestion
                                  control and routing scheme to exploit
                                  path diversity in the Internet . . . . . 1260--1271
                Dritan Nace and   
             Nhat-Linh Doan and   
               Eric Gourdin and   
                   Bernard Liau   Computing optimal max-min fair resource
                                  allocation for elastic flows . . . . . . 1272--1281
               Wei-Hua Wang and   
      Marimuthu Palaniswami and   
                  Steven H. Low   Application-oriented flow control:
                                  fundamentals, algorithms and fairness    1282--1291
     Anthony C. Boucouvalas and   
                       Pi Huang   OBEX over IrDA: performance analysis and
                                  optimization by considering multiple
                                  applications . . . . . . . . . . . . . . 1292--1301
           Jacob Chakareski and   
                 Philip A. Chou   RaDiO edge: rate-distortion optimized
                                  proxy-driven streaming from the network
                                  edge . . . . . . . . . . . . . . . . . . 1302--1312
                Xingzhe Fan and   
      Kartikeya Chandrayana and   
                Murat Arcak and   
     Shivkumar Kalyanaraman and   
             John Ting-Yung Wen   A two-time-scale design for edge-based
                                  detection and rectification of
                                  uncooperative flows  . . . . . . . . . . 1313--1322
                   Feng Xie and   
                  Gang Feng and   
               Chee Kheong Siew   The impact of loss recovery on
                                  congestion control for reliable
                                  multicast  . . . . . . . . . . . . . . . 1323--1335
             Dean H. Lorenz and   
                 Ariel Orda and   
                  Danny Raz and   
                  Yuval Shavitt   Efficient QoS partition and routing of
                                  unicast and multicast  . . . . . . . . . 1336--1347
                Xiaojun Lin and   
                 Ness B. Shroff   An optimization-based approach for QoS
                                  routing in high-bandwidth networks . . . 1348--1361
         Sriram Ramabhadran and   
                Joseph Pasquale   The Stratified Round Robin scheduler:
                                  design, analysis and implementation  . . 1362--1373
          Michael Rosenblum and   
      Constantine Caramanis and   
          Michel X. Goemans and   
                   Vahid Tarokh   Approximating fluid schedules in
                                  crossbar packet-switches and Banyan
                                  networks . . . . . . . . . . . . . . . . 1374--1387
                      Maher Ali   Generalized sharing in survivable
                                  optical networks . . . . . . . . . . . . 1388--1399


IEEE\slash ACM Transactions on Networking
Volume 15, Number 1, February, 2007

      Nathaniel E. Baughman and   
            Marc Liberatore and   
              Brian Neil Levine   Cheat-proof playout for centralized and
                                  peer-to-peer gaming  . . . . . . . . . . 1--13
        Ramana Rao Kompella and   
               Sumeet Singh and   
                George Varghese   On scalable attack detection in the
                                  network  . . . . . . . . . . . . . . . . 14--25
        Ramaswamy Ramaswamy and   
                    Tilman Wolf   High-speed prefix-preserving IP address
                                  anonymization for passive measurement
                                  systems  . . . . . . . . . . . . . . . . 26--39
               Haining Wang and   
                  Cheng Jin and   
                   Kang G. Shin   Defense against spoofed IP traffic using
                                  hop-count filtering  . . . . . . . . . . 40--53
             Sharad Jaiswal and   
        Gianluca Iannaccone and   
            Christophe Diot and   
                 Jim Kurose and   
                    Don Towsley   Measurement and classification of
                                  out-of-sequence packets in a Tier-1 IP
                                  backbone . . . . . . . . . . . . . . . . 54--66
               Dogu Arifler and   
         Gustavo de Veciana and   
                 Brian L. Evans   A factor analytic approach to inferring
                                  congestion sharing based on flow level
                                  measurements . . . . . . . . . . . . . . 67--79
                 Caixia Chi and   
                Dawei Huang and   
                  David Lee and   
                   XiaoRong Sun   Lazy flooding: a new technique for
                                  information dissemination in distributed
                                  network systems  . . . . . . . . . . . . 80--92
             Seung Jun Baek and   
             Gustavo De Veciana   Spatial energy balancing through
                                  proactive multipath routing in wireless
                                  multihop networks  . . . . . . . . . . . 93--104
    Ioannis Ch. Paschalidis and   
                    Wei Lai and   
              David Starobinski   Asymptotically optimal transmission
                                  policies for large-scale low-power
                                  wireless sensor networks . . . . . . . . 105--118
             Jakob Eriksson and   
         Michalis Faloutsos and   
      Srikanth V. Krishnamurthy   DART: dynamic address routing for
                                  scalable ad hoc and mesh networks  . . . 119--132
                    Yung Yi and   
              Sanjay Shakkottai   Hop-by-hop congestion control over a
                                  wireless multi-hop network . . . . . . . 133--144
                 Liang Song and   
           Dimitrios Hatzinakos   A cross-layer architecture of wireless
                                  sensor networks for target tracking  . . 145--158
               David Malone and   
                  Ken Duffy and   
                     Doug Leith   Modeling the 802.11 distributed
                                  coordination function in nonsaturated
                                  heterogeneous conditions . . . . . . . . 159--172
               Zongming Fei and   
                   Mengkun Yang   A proactive tree recovery mechanism for
                                  resilient overlay multicast  . . . . . . 173--186
           Seong-Ryong Kang and   
                Dmitri Loguinov   Modeling best-effort and FEC streaming
                                  of scalable video in lossy network
                                  channels . . . . . . . . . . . . . . . . 187--200
               Guoliang Xue and   
               Arunabha Sen and   
                Weiyi Zhang and   
                  Jian Tang and   
        Krishnaiya Thulasiraman   Finding a path subject to many additive
                                  QoS constraints  . . . . . . . . . . . . 201--211
                   Yong Lee and   
                 Jianyu Lou and   
                Junzhou Luo and   
                   Xiaojun Shen   An efficient packet scheduling algorithm
                                  with deadline guarantees for
                                  input-queued switches  . . . . . . . . . 212--225
           Ayman G. Fayoumi and   
            Anura P. Jayasumana   A surjective-mapping based model for
                                  optical shared-buffer cross-connect  . . 226--233
             Zhenghao Zhang and   
                  Yuanyuan Yang   On-line optimal wavelength assignment in
                                  WDM networks with shared wavelength
                                  converter pool . . . . . . . . . . . . . 234--245

IEEE\slash ACM Transactions on Networking
Volume 15, Number 2, April, 2007

              Nick Feamster and   
               Jennifer Rexford   Network-wide prediction of BGP routes    253--266
       Giuseppe Di Battista and   
            Thomas Erlebach and   
             Alexander Hall and   
        Maurizio Patrignani and   
          Maurizio Pizzonia and   
                  Thomas Schank   Computing the types of the relationships
                                  between autonomous systems . . . . . . . 267--280
                    Ping Ji and   
                   Zihui Ge and   
                 Jim Kurose and   
                    Don Towsley   A comparison of hard-state and
                                  soft-state signaling protocols . . . . . 281--294
    Predrag R. Jelenkovi\'c and   
       Petar Mom\vcilovi\'c and   
             Mark S. Squillante   Scalability of wireless networks . . . . 295--308
              Ping Chung Ng and   
               Soung Chang Liew   Throughput analysis of IEEE802.11
                                  multi-hop ad hoc networks  . . . . . . . 309--322
             Gennaro Boggia and   
             Pietro Camarda and   
       Luigi Alfredo Grieco and   
                Saverio Mascolo   Feedback-based control for providing
                                  real-time services with the 802.11e MAC  323--333
                    Hai Liu and   
                Xiaohua Jia and   
               Peng-Jun Wan and   
                Chih-Wei Yi and   
              S. Kami Makki and   
                  Niki Pissinou   Maximizing lifetime of sensor
                                  surveillance systems . . . . . . . . . . 334--345
    Seyit A. Çamtepe and   
              Bülent Yener   Combinatorial design of key distribution
                                  mechanisms for wireless sensor networks  346--358
         Srihari Nelakuditi and   
               Sanghwan Lee and   
                  Yinzhe Yu and   
               Zhi-Li Zhang and   
                 Chen-Nee Chuah   Fast local rerouting for handling
                                  transient link failures  . . . . . . . . 359--372
                Sonia Fahmy and   
                   Minseok Kwon   Characterizing overlay multicast
                                  networks and their costs . . . . . . . . 373--386
          Marjan Bozinovski and   
           Hans P. Schwefel and   
                  Ramjee Prasad   Maximum availability server selection
                                  policy for efficient and reliable
                                  session control systems  . . . . . . . . 387--399
          Mansoor Alicherry and   
                 Randeep Bhatia   Simple pre-provisioning scheme to enable
                                  fast restoration . . . . . . . . . . . . 400--412
                 Ron Banner and   
                     Ariel Orda   Multipath routing algorithms for
                                  congestion minimization  . . . . . . . . 413--424
      Alexandre O. Stauffer and   
              Valmir C. Barbosa   Probabilistic heuristics for
                                  disseminating information in networks    425--435
          Nicholas B. Chang and   
                    Mingyan Liu   Controlled flooding search in a large
                                  network  . . . . . . . . . . . . . . . . 436--449
            Aggelos Ioannou and   
        Manolis G. H. Katevenis   Pipelined heap (priority queue)
                                  management for advanced scheduling in
                                  high-speed networks  . . . . . . . . . . 450--461
                  Haibin Lu and   
                   Sartaj Sahni   $ O(\log W) $ multidimensional packet
                                  classification . . . . . . . . . . . . . 462--472
                  Eli Brosh and   
                 Asaf Levin and   
                  Yuval Shavitt   Approximation and heuristic algorithms
                                  for minimum-delay application-layer
                                  multicast trees  . . . . . . . . . . . . 473--484

IEEE\slash ACM Transactions on Networking
Volume 15, Number 3, June, 2007

             Augustin Soule and   
              Antonio Nucci and   
               Rene L. Cruz and   
            Emilio Leonardi and   
                      Nina Taft   Estimating dynamic traffic matrices by
                                  using viable routing changes . . . . . . 485--498
            David E. Taylor and   
             Jonathan S. Turner   ClassBench: a packet classification
                                  benchmark  . . . . . . . . . . . . . . . 499--511
             Mortada Mehyar and   
             Demetri Spanos and   
           John Pongsajapan and   
              Steven H. Low and   
              Richard M. Murray   Asynchronous distributed averaging on
                                  communication networks . . . . . . . . . 512--520
      Iordanis Koutsopoulos and   
             Leandros Tassiulas   Joint optimal access point selection and
                                  channel assignment in wireless networks  521--532
         Ashutosh Sabharwal and   
           Ahmad Khoshnevis and   
                Edward Knightly   Opportunistic spectral usage: bounds and
                                  a multi-band CSMA/CA protocol  . . . . . 533--545
     Karthikeyan Sundaresan and   
           Raghupathy Sivakumar   A unified MAC layer framework for ad-hoc
                                  networks with smart antennas . . . . . . 546--559
             Yigal Bejerano and   
              Seung-Jae Han and   
                          Li Li   Fairness and load balancing in wireless
                                  LANs using association control . . . . . 560--573
            Mehmet C. Vuran and   
                Ian F. Akyildiz   A-MAC: adaptive medium access control
                                  for next generation wireless terminals   574--587
               Anurag Kumar and   
               Eitan Altman and   
           Daniele Miorandi and   
                   Munish Goyal   New insights from a fixed-point analysis
                                  of single cell IEEE 802.11 WLANs . . . . 588--601
      Denizhan N. Alparslan and   
                Khosrow Sohraby   A generalized random mobility model for
                                  wireless ad hoc networks and its
                                  analysis: one-dimensional case . . . . . 602--615
      Denizhan N. Alparslan and   
                Khosrow Sohraby   Two-dimensional modeling and analysis of
                                  generalized random mobility models for
                                  wireless ad hoc networks . . . . . . . . 616--629
                 Junsoo Lee and   
            Stephan Bohacek and   
    João P. Hespanha and   
                 Katia Obraczka   Modeling communication networks with
                                  hybrid systems . . . . . . . . . . . . . 630--643
              Derek Leonard and   
               Zhongmei Yao and   
                  Vivek Rai and   
                Dmitri Loguinov   On lifetime-based node failure and
                                  stochastic resilience of decentralized
                                  peer-to-peer networks  . . . . . . . . . 644--656
           Michael J. Neely and   
              Eytan Modiano and   
               Yuan-Sheng Cheng   Logarithmic delay for $ N \times N $
                                  packet switches under the crossbar
                                  constraint . . . . . . . . . . . . . . . 657--668
           Nicolas Christin and   
        Jörg Liebeherr and   
               Tarek Abdelzaher   Enhancing class-based service
                                  architectures with adaptive rate
                                  allocation and dropping mechanisms . . . 669--682
      Balaji Krithikaivasan and   
                  Yong Zeng and   
               Kaushik Deka and   
                     Deep Medhi   ARCH-based traffic forecasting and
                                  dynamic bandwidth provisioning for
                                  periodically measured nonstationary
                                  traffic  . . . . . . . . . . . . . . . . 683--696
                 Cheng Chen and   
               Zheng Guo Li and   
                  Yeng Chai Soh   MRF: a framework for source and
                                  destination based bandwidth
                                  differentiation service  . . . . . . . . 697--708
          Massimo Tornatore and   
                Guido Maier and   
              Achille Pattavina   WDM network design by ILP models based
                                  on flow aggregation  . . . . . . . . . . 709--720
                  Chunsheng Xin   Blocking analysis of dynamic traffic
                                  grooming in mesh WDM optical networks    721--733

IEEE\slash ACM Transactions on Networking
Volume 15, Number 4, August, 2007

                 Ron Banner and   
                     Ariel Orda   The power of tuning: a novel approach
                                  for the efficient design of survivable
                                  networks . . . . . . . . . . . . . . . . 737--749
              Kwok Shing Ho and   
                Kwok Wai Cheung   Generalized survivable network . . . . . 750--760
            Renata Teixeira and   
         Timothy G. Griffin and   
     Mauricio G. C. Resende and   
               Jennifer Rexford   TIE breaking: tunable interdomain egress
                                  selection  . . . . . . . . . . . . . . . 761--774
               Xiaowei Yang and   
                David Clark and   
               Arthur W. Berger   NIRA: a new inter-domain routing
                                  architecture . . . . . . . . . . . . . . 775--788
              Antonio Nucci and   
     Supratik Bhattacharyya and   
                  Nina Taft and   
                Christophe Diot   IGP link weight assignment for
                                  operational Tier-1 backbones . . . . . . 789--802
                  Smita Rai and   
            Omkar Deshpande and   
                  Canhui Ou and   
          Charles U. Martel and   
            Biswanath Mukherjee   Reliable multipath provisioning for
                                  high-capacity backbone mesh networks . . 803--812
     Bernardo A. Movsichoff and   
       Constantino M. Lagoa and   
                        Hao Che   End-to-end optimal algorithms for
                                  integrated QoS, traffic engineering, and
                                  failure recovery . . . . . . . . . . . . 813--823
                    Ao Tang and   
               Jiantao Wang and   
              Steven H. Low and   
                    Mung Chiang   Equilibrium of heterogeneous congestion
                                  control: existence and uniqueness  . . . 824--837
              Yueping Zhang and   
           Seong-Ryong Kang and   
                Dmitri Loguinov   Delay-independent stability and
                                  performance of distributed congestion
                                  control  . . . . . . . . . . . . . . . . 838--851
                Injong Rhee and   
                      Lisong Xu   Limitations of equation-based congestion
                                  control  . . . . . . . . . . . . . . . . 852--865
          Robert N. Shorten and   
               Douglas J. Leith   On queue provisioning, network
                                  efficiency and the transmission control
                                  protocol . . . . . . . . . . . . . . . . 866--877
               Yanping Zhao and   
             Derek L. Eager and   
                 Mary K. Vernon   Network bandwidth requirements for
                                  scalable on-demand streaming . . . . . . 878--891
              Xiaoming Wang and   
                Dmitri Loguinov   Load-balancing performance of consistent
                                  hashing: asymptotic analysis of random
                                  node join  . . . . . . . . . . . . . . . 892--905
              Pi-Chung Wang and   
             Chun-Liang Lee and   
              Chia-Tai Chan and   
                  Hung-Yi Chang   Performance improvement of
                                  two-dimensional packet classification by
                                  filter rephrasing  . . . . . . . . . . . 906--917
                Xiliang Liu and   
         Kaliappa Ravindran and   
                Dmitri Loguinov   A queueing-theoretic foundation of
                                  available bandwidth estimation:
                                  single-hop analysis  . . . . . . . . . . 918--931
               Reuven Cohen and   
                   Liran Katzir   A generic quantitative approach to the
                                  scheduling of synchronous packets in a
                                  shared uplink wireless channel . . . . . 932--943
         Gábor Fodor and   
            Miklós Telek   Bounding the blocking probabilities in
                                  multirate CDMA networks supporting
                                  elastic services . . . . . . . . . . . . 944--956
                Xiaojun Cao and   
               Vishal Anand and   
                  Chunming Qiao   Waveband switching for dynamic traffic
                                  demands in multigranular optical
                                  networks . . . . . . . . . . . . . . . . 957--968
                Hung Q. Ngo and   
                 Dazhen Pan and   
                  Yuanyuan Yang   Optical switching networks with minimum
                                  number of limited-range wavelength
                                  converters . . . . . . . . . . . . . . . 969--979

IEEE\slash ACM Transactions on Networking
Volume 15, Number 5, October, 2007

              Gaurav Sharma and   
              Ravi Mazumdar and   
                 Ness B. Shroff   Delay and capacity trade-offs in mobile
                                  ad hoc networks: a global perspective    981--992
              Richard J. La and   
                      Yijie Han   Distribution of path durations in mobile
                                  ad hoc networks and path selection . . . 993--1006
                  Daji Qiao and   
              Sunghyun Choi and   
                   Kang G. Shin   Interference analysis and transmit power
                                  control in IEEE 802.11a/h wireless LANs  1007--1020
                 Longbi Lin and   
             Ness B. Shroff and   
                     R. Srikant   Asymptotically optimal energy-aware
                                  routing for multihop wireless networks
                                  with renewable energy sources  . . . . . 1021--1034
              Aditya Karnik and   
                   Anurag Kumar   Distributed optimal self-organization in
                                  ad hoc wireless sensor networks  . . . . 1035--1045
             Shailesh Patil and   
             Gustavo De Veciana   Managing resources and quality of
                                  service in heterogeneous wireless
                                  systems exploiting opportunism . . . . . 1046--1058
           Robert Schweller and   
                 Zhichun Li and   
                   Yan Chen and   
                    Yan Gao and   
               Ashish Gupta and   
                  Yin Zhang and   
             Peter A. Dinda and   
              Ming-Yang Kao and   
                   Gokhan Memik   Reversible sketches: enabling monitoring
                                  and analysis over high-speed data
                                  streams  . . . . . . . . . . . . . . . . 1059--1072
        Bozidar Radunovi\'c and   
            Jean-Yves Le Boudec   A unified framework for max-min and
                                  min-max fairness with applications . . . 1073--1083
                   Yan Chen and   
               David Bindel and   
               Han Hee Song and   
                  Randy H. Katz   Algebra-based scalable overlay network
                                  monitoring: algorithms, evaluation, and
                                  applications . . . . . . . . . . . . . . 1084--1097
                 Yasong Jin and   
               Soshant Bali and   
           Tyrone E. Duncan and   
                Victor S. Frost   Predicting properties of congestion
                                  events for a queueing system with fBm
                                  traffic  . . . . . . . . . . . . . . . . 1098--1108
                Yee-Ting Li and   
              Douglas Leith and   
              Robert N. Shorten   Experimental evaluation of TCP protocols
                                  for high-speed networks  . . . . . . . . 1109--1122
        Olivier Bonaventure and   
          Clarence Filsfils and   
         Pierre François   Achieving sub-50 milliseconds recovery
                                  upon BGP peering link failures . . . . . 1123--1135
                Anton Riedl and   
             Dominic A. Schupke   Routing optimization in IP networks
                                  utilizing additive and concave link
                                  metrics  . . . . . . . . . . . . . . . . 1136--1148
               Yanping Zhao and   
             Derek L. Eager and   
                 Mary K. Vernon   Scalable on-demand streaming of
                                  nonlinear media  . . . . . . . . . . . . 1149--1162
                   Jikai Li and   
              Chunming Qiao and   
                  Jinhui Xu and   
                       Dahai Xu   Maximizing throughput for optical burst
                                  switching networks . . . . . . . . . . . 1163--1176
                 Jing Zhang and   
                  Keyao Zhu and   
                   Hui Zang and   
          Norman S. Matloff and   
            Biswanath Mukherjee   Availability-aware provisioning
                                  strategies for differentiated protection
                                  services in wavelength-convertible WDM
                                  mesh networks  . . . . . . . . . . . . . 1177--1190
             Zhenghao Zhang and   
                  Yuanyuan Yang   A novel analytical model for switches
                                  with shared buffer . . . . . . . . . . . 1191--1203
              Dijiang Huang and   
               Manish Mehta and   
     Appie van de Liefvoort and   
                     Deep Medhi   Modeling pairwise key establishment for
                                  random key predistribution in
                                  large-scale sensor networks  . . . . . . 1204--1215

IEEE\slash ACM Transactions on Networking
Volume 15, Number 6, December, 2007

                    Long Le and   
                  Jay Aikat and   
               Kevin Jeffay and   
              F. Donelson Smith   The effects of active queue management
                                  and explicit congestion notification on
                                  Web performance  . . . . . . . . . . . . 1217--1230
                   Thomas Voice   Stability of multi-path dual congestion
                                  control algorithms . . . . . . . . . . . 1231--1239
            Prashanth Hande and   
              Shengyu Zhang and   
                    Mung Chiang   Distributed rate allocation for
                                  inelastic flows  . . . . . . . . . . . . 1240--1253
         Patrick G. Bridges and   
               Gary T. Wong and   
             Matti Hiltunen and   
     Richard D. Schlichting and   
             Matthew J. Barrick   A configurable and extensible transport
                                  protocol . . . . . . . . . . . . . . . . 1254--1265
              Nick Feamster and   
              Ramesh Johari and   
              Hari Balakrishnan   Implications of autonomy for the
                                  expressiveness of policy routing . . . . 1266--1279
     Pierre François and   
            Olivier Bonaventure   Avoiding transient loops during the
                                  convergence of link-state routing
                                  protocols  . . . . . . . . . . . . . . . 1280--1292
Gábor Rétvári and   
József J. Bíró and   
                  Tibor Cinkler   On shortest path representation  . . . . 1293--1306
                   Jin Xiao and   
                  Raouf Boutaba   Assessing network service profitability:
                                  modeling from market science perspective 1307--1320
                Amos Beimel and   
               Shlomi Dolev and   
                    Noam Singer   RT oblivious erasure correcting  . . . . 1321--1332
            Atilla Eryilmaz and   
                     R. Srikant   Fair resource allocation in wireless
                                  networks using queue-length-based
                                  scheduling and congestion control  . . . 1333--1344
  Mohammad Taghi Hajiaghayi and   
           Nicole Immorlica and   
              Vahab S. Mirrokni   Power optimization in fault-tolerant
                                  topology control algorithms for wireless
                                  multi-hop networks . . . . . . . . . . . 1345--1358
               Ritesh Madan and   
               Shuguang Cui and   
                Sanjay Lall and   
            Andrea J. Goldsmith   Modeling and optimization of
                                  transmission schemes in
                                  energy-constrained wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1359--1372
                Yaling Yang and   
                   Jun Wang and   
                  Robin Kravets   Distributed optimal contention window
                                  control for elastic traffic in
                                  single-cell wireless LANs  . . . . . . . 1373--1386
             Xiangying Yang and   
             Gustavo De Veciana   Inducing multiscale clustering using
                                  multistage MAC contention in CDMA ad hoc
                                  networks . . . . . . . . . . . . . . . . 1387--1400
                  Huiyu Luo and   
              Gregory J. Pottie   Designing routes for source coding with
                                  explicit side information in sensor
                                  networks . . . . . . . . . . . . . . . . 1401--1413
               Sandro Bosio and   
             Antonio Capone and   
                  Matteo Cesana   Radio planning of wireless local area
                                  networks . . . . . . . . . . . . . . . . 1414--1427
           Satish Raghunath and   
         K. K. Ramakrishnan and   
         Shivkumar Kalyanaraman   Measurement-based characterization of IP
                                  VPNs . . . . . . . . . . . . . . . . . . 1428--1441
                Chengzhi Li and   
             Almut Burchard and   
            Jörg Liebeherr   A network calculus with effective
                                  bandwidth  . . . . . . . . . . . . . . . 1442--1453
                  Paolo Valente   Exact GPS simulation and optimal fair
                                  scheduling with logarithmic complexity   1454--1466
                   Fang Hao and   
            Murali Kodialam and   
             T. V. Lakshman and   
              Shantidev Mohanty   Fast, memory efficient flow rate
                                  estimation using runs  . . . . . . . . . 1467--1477
                   Jie Lian and   
           Kshirasagar Naik and   
                Gordon B. Agnew   A framework for evaluating the
                                  performance of cluster algorithms for
                                  hierarchical networks  . . . . . . . . . 1478--1489
          Patrick P. C. Lee and   
               Vishal Misra and   
                 Dan Rubenstein   Distributed algorithms for secure
                                  multipath routing in attack-resistant
                                  networks . . . . . . . . . . . . . . . . 1490--1501
                   Heng Yin and   
                   Haining Wang   Building an application-aware IPsec
                                  policy system  . . . . . . . . . . . . . 1502--1513
                    Yan Sun and   
                  K. J. Ray Liu   Hierarchical group access control for
                                  secure multicast communications  . . . . 1514--1526
              Javier Salido and   
               Loukas Lazos and   
               Radha Poovendran   Energy and bandwidth-efficient key
                                  distribution in wireless ad hoc
                                  networks: a cross-layer approach . . . . 1527--1540
            Emilio Leonardi and   
               Marco Mellia and   
        Marco Ajmone Marsan and   
                     Fabio Neri   Optimal scheduling and routing for
                                  maximum network throughput . . . . . . . 1541--1554
           Olufemi Komolafe and   
                    David Harle   An holistic framework for regular
                                  virtual topology design  . . . . . . . . 1555--1564
           Haitham S. Hamza and   
             Jitender S. Deogun   WDM optical interconnects: a balanced
                                  design approach  . . . . . . . . . . . . 1565--1578
              Piotr Cho\lda and   
              Andrzej Jajszczyk   Reliability assessment of optical
                                  p-cycles . . . . . . . . . . . . . . . . 1579--1592
           Mordechai Shalom and   
                    Shmuel Zaks   A $ 10 / 7 + \epsilon $ approximation
                                  for minimizing the number of ADMs in
                                  SONET rings  . . . . . . . . . . . . . . 1593--1602
       François Abel and   
          Cyriel Minkenberg and   
              Ilias Iliadis and   
              Ton Engbersen and   
             Mitchell Gusat and   
        Ferdinand Gramsamer and   
              Ronald P. Luijten   Design issues in next-generation
                                  merchant switch fabrics  . . . . . . . . 1603--1615
                Hongbin Luo and   
                Hongfang Yu and   
                       Lemin Li   Comments on `Segment shared protection
                                  in mesh communication networks with
                                  bandwidth guaranteed tunnels'  . . . . . 1616--1616


IEEE\slash ACM Transactions on Networking
Volume 16, Number 1, February, 2008

             Ram Keralapura and   
             Chen-Nee Chuah and   
                  Nina Taft and   
            Gianluca Iannaccone   Race conditions in coexisting overlay
                                  networks . . . . . . . . . . . . . . . . 1--14
            Michael T. Goodrich   Probabilistic packet marking for
                                  large-scale IP traceback . . . . . . . . 15--24
              Yuval Shavitt and   
                   Tomer Tankel   Hyperbolic embedding of Internet graph
                                  for distance estimation and overlay
                                  construction . . . . . . . . . . . . . . 25--36
              Nick Duffield and   
          Matthias Grossglauser   Trajectory sampling with unreliable
                                  reporting  . . . . . . . . . . . . . . . 37--50
                Fabian Kuhn and   
          Roger Wattenhofer and   
                Aaron Zollinger   An algorithmic approach to geographic
                                  routing in ad hoc and sensor networks    51--62
   Thrasyvoulos Spyropoulos and   
       Konstantinos Psounis and   
         Cauligi S. Raghavendra   Efficient routing in intermittently
                                  connected mobile networks: the
                                  single-copy case . . . . . . . . . . . . 63--76
   Thrasyvoulos Spyropoulos and   
       Konstantinos Psounis and   
         Cauligi S. Raghavendra   Efficient routing in intermittently
                                  connected mobile networks: the
                                  multiple-copy case . . . . . . . . . . . 77--90
              Aditya Akella and   
                Bruce Maggs and   
          Srinivasan Seshan and   
                   Anees Shaikh   On the performance benefits of
                                  multihoming route control  . . . . . . . 91--104
               Shigang Chen and   
             Meongchul Song and   
                   Sartaj Sahni   Two techniques for fast computation of
                                  constrained shortest paths . . . . . . . 105--115
Venugopalan Ramasubramanian and   
            Daniel Mossé   BRA: a bidirectional routing abstraction
                                  for asymmetric mobile ad hoc networks    116--129
                Xiliang Liu and   
         Kaliappa Ravindran and   
                Dmitri Loguinov   A stochastic foundation of available
                                  bandwidth estimation: multi-hop analysis 130--143
               Maulin Patel and   
          R. Chandrasekaran and   
                  S. Venkatesan   Improved quasi-path restoration in mesh
                                  networks . . . . . . . . . . . . . . . . 144--156
 Srinivasan Ramasubramanian and   
                   Amit Chandak   Dual-link failure resiliency through
                                  backup link mutual exclusion . . . . . . 157--169
           Aleksandra Smiljanic   Rate and delay guarantees provided by
                                  Clos packet switches with load balancing 170--181
              Ilias Iliadis and   
              Cyriel Minkenberg   Performance of a speculative
                                  transmission scheme for
                                  scheduling-latency reduction . . . . . . 182--195
                 R. L. Cruz and   
                Saleh Al-Harthi   A service-curve framework for packet
                                  scheduling with switch configuration
                                  delays . . . . . . . . . . . . . . . . . 196--205
                  Saad Mneimneh   Matching from the first iteration: an
                                  iterative switching algorithm for an
                                  input queued switch  . . . . . . . . . . 206--217
                Adam Kirsch and   
           Michael Mitzenmacher   Simple summaries for hashing with
                                  choices  . . . . . . . . . . . . . . . . 218--231
                   Xin Wang and   
        Henning Schulzrinne and   
              Dilip Kandlur and   
                   Dinesh Verma   Measurement and analysis of LDAP
                                  performance  . . . . . . . . . . . . . . 232--243
                William Lau and   
     Gustav Filip Rosenbaum and   
                     Sanjay Jha   Comments on `Dynamic routing of
                                  restorable bandwidth-guaranteed tunnels
                                  using aggregated network resource usage
                                  information' . . . . . . . . . . . . . . 244--245

IEEE\slash ACM Transactions on Networking
Volume 16, Number 2, April, 2008

              Yuh-Ming Chiu and   
                   Do Young Eun   Minimizing file download time in
                                  stochastic peer-to-peer networks . . . . 253--266
           Daniel Stutzbach and   
                Reza Rejaie and   
                 Subhabrata Sen   Characterizing unstructured overlay
                                  topologies in modern P2P file-sharing
                                  systems  . . . . . . . . . . . . . . . . 267--280
              Kin-Wah Kwong and   
                    H. K. Tsang   Building heterogeneous peer-to-peer
                                  networks: protocol and analysis  . . . . 281--292
                Lukas Kencl and   
            Jean-Yves Le Boudec   Adaptive load sharing for network
                                  processors . . . . . . . . . . . . . . . 293--306
               Joel Sommers and   
               Paul Barford and   
              Nick Duffield and   
                       Amos Ron   A geometric approach to improving active
                                  packet loss measurement  . . . . . . . . 307--320
              Y. Thomas Hou and   
                     Yi Shi and   
               Hanif D. Sherali   Rate allocation and network lifetime
                                  problems for wireless sensor networks    321--334
               Nima Sarshar and   
           Behnam A. Rezaei and   
          Vwani P. Roychowdhury   Low latency wireless ad hoc networking:
                                  power and bandwidth challenges and a
                                  solution . . . . . . . . . . . . . . . . 335--346
              Honghai Zhang and   
                Jennifer C. Hou   Asymptotic critical total power for
                                  $k$-connectivity of wireless networks    347--358
         Vehbi Cagri Gungor and   
    Özgür B. Akan and   
                Ian F. Akyildiz   A real-time and reliable transport
                                  (RT)$^2$ protocol for wireless sensor
                                  and actor networks . . . . . . . . . . . 359--370
           Isabella Cerutti and   
           Andrea Fumagalli and   
                     Puja Gupta   Delay models of single-source
                                  single-relay cooperative ARQ protocols
                                  in slotted radio networks with Poisson
                                  frame arrivals . . . . . . . . . . . . . 371--382
               Holger Boche and   
                Martin Schubert   A superlinearly and globally convergent
                                  algorithm for power control and resource
                                  allocation with general interference
                                  functions  . . . . . . . . . . . . . . . 383--395
           Michael J. Neely and   
              Eytan Modiano and   
                   Chih-Ping Li   Fairness and optimal stochastic control
                                  for heterogeneous networks . . . . . . . 396--409
             Seung Yeob Nam and   
                Sunggon Kim and   
                  Dan Keun Sung   Measurement-based admission control at
                                  edge routers . . . . . . . . . . . . . . 410--423
                  Zafar Ali and   
              Waseem Sheikh and   
          Edwin K. P. Chong and   
                   Arif Ghafoor   A scalable call admission control
                                  algorithm  . . . . . . . . . . . . . . . 424--434
                 Minsu Shin and   
                 Song Chong and   
                    Injong Rhee   Dual-resource TCP/AQM for
                                  processing-constrained networks  . . . . 435--449
         Christina Fragouli and   
           Jörg Widmer and   
            Jean-Yves Le Boudec   Efficient broadcasting using network
                                  coding . . . . . . . . . . . . . . . . . 450--463
         Violet R. Syrotiuk and   
        Charles J. Colbourn and   
              Sruthi Yellamraju   Rateless forward error correction for
                                  topology-transparent scheduling  . . . . 464--472
 Srinivasan Ramasubramanian and   
                 Arun K. Somani   MICRON: a framework for connection
                                  establishment in optical networks  . . . 473--485
               Dongmei Wang and   
                    Guangzhi Li   Efficient distributed bandwidth
                                  management for MPLS fast reroute . . . . 486--495
              Aditya Akella and   
                Bruce Maggs and   
          Srinivasan Seshan and   
               Anees Shaikh and   
            Ramesh K. Sitaraman   Corrections to `On the performance
                                  benefits of multihoming route control'   496--496

IEEE\slash ACM Transactions on Networking
Volume 16, Number 3, June, 2008

               Sachin Katti and   
            Hariharan Rahul and   
                  Wenjun Hu and   
                Dina Katabi and   
       Muriel Médard and   
                  Jon Crowcroft   XORs in the air: practical wireless
                                  network coding . . . . . . . . . . . . . 497--510
                Injong Rhee and   
               Ajit Warrier and   
                 Mahesh Aia and   
                Jeongki Min and   
             Mihail L. Sichitiu   Z-MAC: a hybrid MAC for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 511--524
               Archan Misra and   
               Abhishek Roy and   
                   Sajal K. Das   Information-theory based optimal
                                  location management schemes for
                                  integrated multi-system wireless
                                  networks . . . . . . . . . . . . . . . . 525--538
            Behcet Sarikaya and   
                     Xiao Zheng   SIP paging and tracking of wireless LAN
                                  hosts for VoIP . . . . . . . . . . . . . 539--548
   Karthik Lakshminarayanan and   
              Daniel Adkins and   
              Adrian Perrig and   
                     Ion Stoica   Securing user-controlled routing
                                  infrastructures  . . . . . . . . . . . . 549--561
              Seong Soo Kim and   
          A. L. Narasimha Reddy   Statistical techniques for detecting
                                  traffic anomalies through packet header
                                  data . . . . . . . . . . . . . . . . . . 562--575
                 Haifeng Yu and   
           Michael Kaminsky and   
         Phillip B. Gibbons and   
             Abraham D. Flaxman   SybilGuard: defending against sybil
                                  attacks via social networks  . . . . . . 576--589
               Yung-Ming Li and   
                   Yong Tan and   
                  Yong-Pin Zhou   Analysis of scale effects in
                                  peer-to-peer networks  . . . . . . . . . 590--602
   Laurent Massoulié and   
                 Milan Vojnovic   Coupon replication systems . . . . . . . 603--616
Fabián E. Bustamante and   
                        Yi Qiao   Designing less-structured P2P systems
                                  for the expected high churn  . . . . . . 617--627
                   Xunqi Yu and   
         James W. Modestino and   
             Ragip Kurceren and   
                   Yee Sin Chan   A model-based approach to evaluation of
                                  the efficacy of FEC coding in combating
                                  network packet losses  . . . . . . . . . 628--641
                Weiyi Zhang and   
               Guoliang Xue and   
                  Jian Tang and   
       Krishnaiyan Thulasiraman   Faster algorithms for construction of
                                  recovery trees enhancing QoP and QoS . . 642--655
               Guoliang Xue and   
                Weiyi Zhang and   
                  Jian Tang and   
       Krishnaiyan Thulasiraman   Polynomial time approximation algorithms
                                  for multi-constrained QoS routing  . . . 656--669
                   Jian Chu and   
                   Chin-Tau Lea   New architecture and algorithms for fast
                                  construction of hose-model VPNs  . . . . 670--679
              Chen-Shu Wang and   
                Ching-Ter Chang   Integrated genetic algorithm and goal
                                  programming for network topology design
                                  problem with multiple objectives and
                                  multiple criteria  . . . . . . . . . . . 680--690
               Reuven Cohen and   
                   Gabi Nakibly   On the computational complexity and
                                  effectiveness of $N$-hub shortest-path
                                  routing  . . . . . . . . . . . . . . . . 691--704
                Sundar Iyer and   
        Ramana Rao Kompella and   
                   Nick McKeown   Designing packet buffers for router
                                  linecards  . . . . . . . . . . . . . . . 705--717
                  Si-Min He and   
                Shu-Tao Sun and   
              Hong-Tao Guan and   
                Qiang Zheng and   
              You-Jian Zhao and   
                        Wen Gao   On guaranteed smooth switching for
                                  buffered crossbar switches . . . . . . . 718--731
             Xiaohong Jiang and   
          Achille Pattavina and   
               Susumu Horiguchi   Strictly nonblocking $f$-cast photonic
                                  networks . . . . . . . . . . . . . . . . 732--745

IEEE\slash ACM Transactions on Networking
Volume 16, Number 4, August, 2008

         Athina Markopoulou and   
        Gianluca Iannaccone and   
     Supratik Bhattacharyya and   
             Chen-Nee Chuah and   
             Yashar Ganjali and   
                Christophe Diot   Characterization of failures in an
                                  operational IP backbone network  . . . . 749--762
                Min Sik Kim and   
               Taekhyun Kim and   
             Yong-June Shin and   
               Simon S. Lam and   
               Edward J. Powers   A wavelet-based approach to detect
                                  shared congestion  . . . . . . . . . . . 763--776
                     Tao Ye and   
               Hema T. Kaur and   
     Shivkumar Kalyanaraman and   
                   Murat Yuksel   Large-scale network parameter
                                  configuration using an on-line
                                  simulation framework . . . . . . . . . . 777--790
                   Imad Aad and   
         Jean-Pierre Hubaux and   
             Edward W. Knightly   Impact of denial of service attacks on
                                  ad hoc networks  . . . . . . . . . . . . 791--802
         Daniele Micciancio and   
               Saurabh Panjwani   Optimal communication complexity of
                                  generic multicast key distribution . . . 803--813
      Supriya Krishnamurthy and   
            Sameh El-Ansary and   
                Erik Aurell and   
                    Seif Haridi   An analytical study of a structured
                                  overlay in the presence of dynamic
                                  membership . . . . . . . . . . . . . . . 814--825
                    Loc Bui and   
            Atilla Eryilmaz and   
                 R. Srikant and   
                     Xinzhou Wu   Asynchronous congestion control in
                                  multi-hop wireless networks with maximal
                                  matching-based scheduling  . . . . . . . 826--839
               Rajiv Gandhi and   
             Arunesh Mishra and   
       Srinivasan Parthasarathy   Minimizing broadcast latency and
                                  redundancy in ad hoc networks  . . . . . 840--851
            Vincent Lenders and   
                 Martin May and   
              Bernhard Plattner   Density-based anycast: a robust routing
                                  strategy for wireless ad hoc networks    852--863
            Michele Garetto and   
        Theodoros Salonidis and   
             Edward W. Knightly   Modeling per-flow throughput and
                                  capturing starvation in CSMA multi-hop
                                  wireless networks  . . . . . . . . . . . 864--877
               Omesh Tickoo and   
                  Biplab Sikdar   Modeling queueing and channel access
                                  delay in unsaturated IEEE 802.11 random
                                  access MAC based wireless networks . . . 878--891
                Cunqing Hua and   
            Tak-Shing Peter Yum   Optimal routing and data aggregation for
                                  maximizing lifetime of wireless sensor
                                  networks . . . . . . . . . . . . . . . . 892--903
                Xueyan Tang and   
                   Jianliang Xu   Optimizing lifetime for continuous data
                                  aggregation with precision guarantees in
                                  wireless sensor networks . . . . . . . . 904--917
                Rami Langar and   
          Nizar Bouabdallah and   
                  Raouf Boutaba   A comprehensive analysis of mobility
                                  management in MPLS-based wireless access
                                  networks . . . . . . . . . . . . . . . . 918--931
                Yiping Xing and   
                R. Chandramouli   Stochastic learning solution for
                                  distributed discrete power control game
                                  in wireless data networks  . . . . . . . 932--944
               Do Young Eun and   
                   Xinbing Wang   Achieving 100% throughput in TCP/AQM
                                  under aggressive packet marking with
                                  small buffer . . . . . . . . . . . . . . 945--956
         Stephen L. Spitler and   
                  Daniel C. Lee   Integration of explicit
                                  effective-bandwidth-based QoS routing
                                  with best-effort routing . . . . . . . . 957--969
          Andrew Brzezinski and   
                  Eytan Modiano   Achieving 100% throughput in
                                  reconfigurable optical networks  . . . . 970--983
               Karyn Benson and   
          Benjamin Birnbaum and   
    Esteban Molina-Estolano and   
            Ran Libeskind-Hadas   Competitive analysis of online traffic
                                  grooming in WDM rings  . . . . . . . . . 984--997

IEEE\slash ACM Transactions on Networking
Volume 16, Number 5, October, 2008

                    Nan Jin and   
                   Scott Jordan   On the feasibility of dynamic
                                  congestion-based pricing in
                                  differentiated services networks . . . . 1001--1014
            Miriam Allalouf and   
                  Yuval Shavitt   Centralized and distributed algorithms
                                  for routing and weighted max-min fair
                                  bandwidth allocation . . . . . . . . . . 1015--1024
              Ishai Menache and   
                  Nahum Shimkin   Capacity management and equilibrium for
                                  proportional QoS . . . . . . . . . . . . 1025--1037
            Tuna Güven and   
              Richard J. La and   
            Mark A. Shayman and   
            Bobby Bhattacharjee   A unified framework for multipath
                                  routing for unicast and multicast
                                  traffic  . . . . . . . . . . . . . . . . 1038--1051
                    Shu Tao and   
        John Apostolopoulos and   
             Roch Guérin   Real-time monitoring of video quality in
                                  IP networks  . . . . . . . . . . . . . . 1052--1065
             Milan Vojnovic and   
             Ayalvadi J. Ganesh   On the race of worms, alerts, and
                                  patches  . . . . . . . . . . . . . . . . 1066--1079
         Venkatesh Ramaiyan and   
               Anurag Kumar and   
                   Eitan Altman   Fixed point analysis of single cell IEEE
                                  802.11e WLANs: uniqueness and
                                  multistability . . . . . . . . . . . . . 1080--1093
            Hazer Inaltekin and   
              Stephen B. Wicker   The analysis of Nash equilibria of the
                                  one-shot random-access game for wireless
                                  networks and the behavior of selfish
                                  nodes  . . . . . . . . . . . . . . . . . 1094--1107
                   Wei Wang and   
          Vikram Srinivasan and   
                Kee-Chaing Chua   Extending the lifetime of wireless
                                  sensor networks through mobile relays    1108--1120
              Gaurav Sharma and   
               Ravi R. Mazumdar   A case for hybrid sensor networks  . . . 1121--1132
         Sundar Subramanian and   
          Sanjay Shakkottai and   
               Ari Arapostathis   Broadcasting in sensor networks: the
                                  role of local information  . . . . . . . 1133--1146
                Ahmed Bader and   
                    Eylem Ekici   Performance optimization of
                                  interference-limited multihop networks   1147--1160
              Aditya Karnik and   
               Aravind Iyer and   
            Catherine Rosenberg   Throughput-optimal configuration of
                                  fixed wireless networks  . . . . . . . . 1161--1174
              Honghai Zhang and   
                Jennifer C. Hou   On the asymptotic minimum transporting
                                  energy and its implication on the
                                  wireless network capacity  . . . . . . . 1175--1187
               Michael J. Neely   Order optimal delay for opportunistic
                                  scheduling in multi-user wireless
                                  uplinks and downlinks  . . . . . . . . . 1188--1199
      Salah-Eddine Elayoubi and   
     Beno\^\it Fourestié   Performance evaluation of admission
                                  control and adaptive modulation in OFDMA
                                  WiMax systems  . . . . . . . . . . . . . 1200--1211
 Juan José Jaramillo and   
                Fabio Milan and   
                     R. Srikant   Padded frames: a novel algorithm for
                                  stable scheduling in load-balanced
                                  switches . . . . . . . . . . . . . . . . 1212--1225
               Bensong Chen and   
          George N. Rouskas and   
                    Rudra Dutta   On hierarchical traffic grooming in WDM
                                  networks . . . . . . . . . . . . . . . . 1226--1238

IEEE\slash ACM Transactions on Networking
Volume 16, Number 6, December, 2008

                    Kuai Xu and   
               Zhi-Li Zhang and   
         Supratik Bhattacharyya   Internet traffic behavior profiling for
                                  network security monitoring  . . . . . . 1241--1252
                 Minho Sung and   
                     Jun Xu and   
                     Jun Li and   
                          Li Li   Large-scale IP traceback in high-speed
                                  Internet: practical techniques and
                                  information-theoretic foundation . . . . 1253--1266
               Xiaowei Yang and   
            David Wetherall and   
                Thomas Anderson   TVA: a DoS-limiting network architecture 1267--1280
                   Yong Xia and   
Lakshminarayanan Subramanian and   
                 Ion Stoica and   
         Shivkumar Kalyanaraman   One more bit is enough . . . . . . . . . 1281--1294
            Renata Teixeira and   
                Aman Shaikh and   
         Timothy G. Griffin and   
               Jennifer Rexford   Impact of hot-potato routing changes in
                                  IP networks  . . . . . . . . . . . . . . 1295--1307
            Fernando Solano and   
             Thomas Stidsen and   
             Ramon Fabregat and   
                Jose Luis Marzo   Label space reduction in MPLS networks:
                                  how much can a single stacked label do?  1308--1320
          Randeep S. Bhatia and   
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Bandwidth guaranteed routing with fast
                                  restoration against link and node
                                  failures . . . . . . . . . . . . . . . . 1321--1330
            Stamatis Stefanakos   Reliable routings in networks with
                                  generalized link failure events  . . . . 1331--1339
       George F. Georgakopoulos   Buffered cross-bar switches, revisited:
                                  design steps, proofs and simulations
                                  towards optimal rate and minimum buffer
                                  memory . . . . . . . . . . . . . . . . . 1340--1351
     Srinivasan Ramasubramanian   Supporting multiple protection
                                  strategies in optical networks . . . . . 1352--1365
                   Lei Song and   
                 Jing Zhang and   
            Biswanath Mukherjee   A comprehensive study on
                                  backup-bandwidth reprovisioning after
                                  network-state updates in survivable
                                  telecom mesh networks  . . . . . . . . . 1366--1377
                   Qun Zhao and   
                 Mohan Gurusamy   Lifetime maximization for connected
                                  target coverage in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1378--1391
       John Papandriopoulos and   
            Subhrakanti Dey and   
                    Jamie Evans   Optimal and distributed protocols for
                                  cross-layer design of physical and
                                  transport layers in MANETs . . . . . . . 1392--1405
          Andrew Brzezinski and   
                Gil Zussman and   
                  Eytan Modiano   Distributed throughput maximization in
                                  wireless mesh networks via
                                  pre-partitioning . . . . . . . . . . . . 1406--1419
            Prashanth Hande and   
             Sundeep Rangan and   
                Mung Chiang and   
                     Xinzhou Wu   Distributed uplink power control for
                                  optimal SIR assignment in cellular data
                                  networks . . . . . . . . . . . . . . . . 1420--1433
              Aaron Walters and   
                 David Zage and   
           Cristina Nita Rotaru   A framework for mitigating attacks
                                  against measurement-based adaptation
                                  mechanisms in unstructured multicast
                                  overlay networks . . . . . . . . . . . . 1434--1446
            Mohamed Hefeeda and   
                    Osama Saleh   Traffic modeling and proportional
                                  partial caching for peer-to-peer systems 1447--1460
                     Tao Wu and   
              David Starobinski   A comparative analysis of server
                                  selection in content replication
                                  networks . . . . . . . . . . . . . . . . 1461--1474
              Derek Leonard and   
               Zhongmei Yao and   
              Xiaoming Wang and   
                Dmitri Loguinov   On static and dynamic partitioning
                                  behavior of large-scale P2P networks . . 1475--1488


IEEE\slash ACM Transactions on Networking
Volume 17, Number 1, February, 2009

           Piet Van Mieghem and   
               Jasmina Omic and   
                   Robert Kooij   Virus spread in networks . . . . . . . . 1--14
                     Yi Xie and   
                  Shun-Zheng Yu   Monitoring the application-layer DDoS
                                  attacks for popular websites . . . . . . 15--25
         Supranamaya Ranjan and   
            Ram Swaminathan and   
              Mustafa Uysal and   
              Antonio Nucci and   
                Edward Knightly   DDoS-shield: DDoS-resilient scheduling
                                  to counter application layer attacks . . 26--39
            Patrick Traynor and   
               William Enck and   
           Patrick McDaniel and   
                Thomas La Porta   Mitigating attacks on open functionality
                                  in SMS-capable cellular networks . . . . 40--53
                     Yi Xie and   
                  Shun-Zheng Yu   A large-scale hidden semi-Markov model
                                  for anomaly detection on user browsing
                                  behaviors  . . . . . . . . . . . . . . . 54--65
                  Franck Le and   
                Sihyung Lee and   
                  Tina Wong and   
               Hyong S. Kim and   
                Darrell Newcomb   Detecting network-wide and
                                  router-specific misconfigurations
                                  through data mining  . . . . . . . . . . 66--79
            Khaled Harfoush and   
             Azer Bestavros and   
                     John Byers   Measuring capacity bandwidth of targeted
                                  path segments  . . . . . . . . . . . . . 80--92
           Piet Van Mieghem and   
                   Huijuan Wang   The observable part of a network . . . . 93--105
               Han Hee Song and   
                   Lili Qiu and   
                      Yin Zhang   NetQuest: a flexible framework for
                                  large-scale network measurement  . . . . 106--119
         György Terdik and   
                   Tibor Gyires   Lévy flights and fractal modeling of
                                  Internet traffic . . . . . . . . . . . . 120--129
                 Reaz Ahmed and   
                  Raouf Boutaba   Plexus: a scalable peer-to-peer protocol
                                  enabling efficient subset search . . . . 130--143
               Zhongmei Yao and   
              Xiaoming Wang and   
              Derek Leonard and   
                Dmitri Loguinov   Node isolation model and age-based
                                  neighbor selection in unstructured P2P
                                  networks . . . . . . . . . . . . . . . . 144--157
                Xiaoming Fu and   
        Henning Schulzrinne and   
          Hannes Tschofenig and   
         Christian Dickmann and   
                 Dieter Hogrefe   Overhead and performance study of the
                                  General Internet Signaling Transport
                                  (GIST) protocol  . . . . . . . . . . . . 158--171
      Pascal von Rickenbach and   
          Roger Wattenhofer and   
                Aaron Zollinger   Algorithmic models of interference in
                                  wireless ad hoc and sensor networks  . . 172--185
           Khaled Elmeleegy and   
                Alan L. Cox and   
                T. S. Eugene Ng   Understanding and mitigating the effects
                                  of count to infinity in Ethernet
                                  networks . . . . . . . . . . . . . . . . 186--199
                   Jie Lian and   
                 Yunhao Liu and   
           Kshirasagar Naik and   
                       Lei Chen   Virtual surrounding face geocasting in
                                  wireless ad hoc and sensor networks  . . 200--211
            Sastry Kompella and   
                 Shiwen Mao and   
              Y. Thomas Hou and   
               Hanif D. Sherali   On path selection and rate allocation
                                  for video in wireless mesh networks  . . 212--224
       Teerawat Issariyakul and   
           Vikram Krishnamurthy   Amplify-and-forward cooperative
                                  diversity wireless networks: model,
                                  analysis, and monotonicity properties    225--238
                Hongbin Luo and   
                   Lemin Li and   
                    Hongfang Yu   Routing connections with differentiated
                                  reliability requirements in WDM mesh
                                  networks . . . . . . . . . . . . . . . . 253--266
           Stefano Avallone and   
            Ian F. Akyildiz and   
                 Giorgio Ventre   A channel and rate assignment algorithm
                                  and a layer-2.5 forwarding paradigm for
                                  multi-radio wireless mesh networks . . . 267--280
           Vahid Tabatabaee and   
             Leandros Tassiulas   MNCM: a critical node matching approach
                                  to scheduling for input buffered
                                  switches with no speedup . . . . . . . . 294--304
                 Andrew Zalesky   To burst or circuit switch?  . . . . . . 305--318
               Guanglei Liu and   
                     Chuanyi Ji   Scalability of network-failure
                                  resilience: analysis using multi-layer
                                  probabilistic graphical models . . . . . 319--331
          Giridhar Jayavelu and   
 Srinivasan Ramasubramanian and   
                  Ossama Younis   Maintaining colored trees for disjoint
                                  multipath routing under node failures    346--359

IEEE\slash ACM Transactions on Networking
Volume 17, Number 2, April, 2009

                    Bin Fan and   
             John C. S. Lui and   
                  Dah-Ming Chiu   The design trade-offs of BitTorrent-like
                                  file sharing protocols . . . . . . . . . 365--376
           Daniel Stutzbach and   
                Reza Rejaie and   
              Nick Duffield and   
             Subhabrata Sen and   
               Walter Willinger   On unbiased sampling for unstructured
                                  peer-to-peer networks  . . . . . . . . . 377--390
                   Yihua He and   
            Georgos Siganos and   
         Michalis Faloutsos and   
         Srikanth Krishnamurthy   Lord of the links: a framework for
                                  discovering missing links in the
                                  Internet topology  . . . . . . . . . . . 391--404
              Andrea Bianco and   
          Gianluca Mardente and   
               Marco Mellia and   
          Maurizio Munaf\`o and   
               Luca Muscariello   Web user-session inference by means of
                                  clustering techniques  . . . . . . . . . 405--416
              Darryl Veitch and   
              Julien Ridoux and   
             Satish Babu Korada   Robust synchronization of absolute and
                                  difference clocks over networks  . . . . 417--430
     Björn Scheuermann and   
             Wolfgang Kiess and   
                Magnus Roos and   
              Florian Jarre and   
                   Martin Mauve   On the time synchronization of
                                  distributed log files in networks with
                                  local broadcast media  . . . . . . . . . 431--444
           Ricardo Oliveira and   
             Beichuan Zhang and   
                    Dan Pei and   
                    Lixia Zhang   Quantifying path exploration in the
                                  Internet . . . . . . . . . . . . . . . . 445--458
            Murali Kodialam and   
             T. V. Lakshman and   
             James B. Orlin and   
               Sudipta Sengupta   Oblivious routing of highly variable
                                  traffic in service overlays and IP
                                  backbones  . . . . . . . . . . . . . . . 459--472
             Amund Kvalbein and   
      Audun Fosselie Hansen and   
            Tarik \vCi\vcic and   
             Stein Gjessing and   
                     Olav Lysne   Multiple routing configurations for fast
                                  IP network recovery  . . . . . . . . . . 473--486
               Reuven Cohen and   
                   Gabi Nakibly   A traffic engineering approach for
                                  placement and selection of network
                                  services . . . . . . . . . . . . . . . . 487--500
           Geoffrey Goodell and   
          Mema Roussopoulos and   
                  Scott Bradner   A directory service for perspective
                                  access networks  . . . . . . . . . . . . 501--514
           Pradeep Kyasanur and   
                Nitin H. Vaidya   Capacity of multichannel wireless
                                  networks under the protocol model  . . . 515--527
            Bhaskaran Raman and   
         Kameswari Chebrolu and   
         Dattatraya Gokhale and   
                  Sayandeep Sen   On the feasibility of the link
                                  abstraction in wireless mesh networks    528--541
              Bow-Nan Cheng and   
               Murat Yuksel and   
         Shivkumar Kalyanaraman   Orthogonal rendezvous routing protocol
                                  for wireless mesh networks . . . . . . . 542--555
                Mehdi Rasti and   
          Ahmad R. Sharafat and   
                    Babak Seyfe   Pareto-efficient and goal-driven power
                                  control in wireless networks: a
                                  game-theoretic approach with a novel
                                  pricing scheme . . . . . . . . . . . . . 556--569
               Reuven Cohen and   
                 Boris Kapchits   An optimal wake-up scheduling algorithm
                                  for minimizing energy consumption while
                                  limiting maximum delay in a mesh sensor
                                  network  . . . . . . . . . . . . . . . . 570--581
             Hanan Shpungin and   
                  Michael Segal   Low-energy fault-tolerant bounded-hop
                                  broadcast in wireless networks . . . . . 582--590
                  Tianji Li and   
                   Qiang Ni and   
               David Malone and   
              Douglas Leith and   
                  Yang Xiao and   
               Thierry Turletti   Aggregation with fragment retransmission
                                  for very high-speed WLANs  . . . . . . . 591--604
  Alvaro A. Cárdenas and   
         Svetlana Radosavac and   
                  John S. Baras   Evaluation of detection algorithms for
                                  MAC layer misbehavior: theory and
                                  experiments  . . . . . . . . . . . . . . 605--617
                Mingyu Chen and   
                Xingzhe Fan and   
          Manohar N. Murthi and   
  T. Dilusha Wickramarathna and   
               Kamal Premaratne   Normalized queueing delay: congestion
                                  control jointly utilizing delay and
                                  marking  . . . . . . . . . . . . . . . . 618--631
                     Bin Wu and   
              Kwan L. Yeung and   
               Mounir Hamdi and   
                         Xin Li   Minimizing internal speedup for
                                  performance guaranteed switches with
                                  optical fabrics  . . . . . . . . . . . . 632--645
            Matthew Andrews and   
                     Lisa Zhang   Complexity of wavelength assignment in
                                  optical network optimization . . . . . . 646--657
          Kalyan Kuppuswamy and   
                  Daniel C. Lee   An analytic approach to efficiently
                                  computing call blocking probabilities
                                  for multiclass WDM networks  . . . . . . 658--670
       Abdelhamid E. Eshoul and   
             Hussein T. Mouftah   Survivability approaches using
                                  $p$-cycles in WDM mesh networks under
                                  static traffic . . . . . . . . . . . . . 671--683

IEEE\slash ACM Transactions on Networking
Volume 17, Number 3, June, 2009

    Ioannis Ch. Paschalidis and   
           Georgios Smaragdakis   Spatio-temporal network anomaly
                                  detection by assessing deviations of
                                  empirical measures . . . . . . . . . . . 685--697
                     Yan Hu and   
              Dah-Ming Chiu and   
                 John C. S. Lui   Entropy based adaptive flow aggregation  698--711
 Kashi Venkatesh Vishwanath and   
                    Amin Vahdat   Swing: realistic and responsive network
                                  traffic generation . . . . . . . . . . . 712--725
              Xiaoming Wang and   
               Zhongmei Yao and   
                Dmitri Loguinov   Residual-based estimation of peer and
                                  link lifetimes in P2P networks . . . . . 726--739
                  Feng Wang and   
                   Jian Qiu and   
                  Lixin Gao and   
                       Jia Wang   On understanding transient interdomain
                                  routing failures . . . . . . . . . . . . 740--751
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Locally restorable routing of highly
                                  variable traffic . . . . . . . . . . . . 752--763
            Barath Raghavan and   
             Patric Verkaik and   
                Alex C. Snoeren   Secure and policy-compliant source
                                  routing  . . . . . . . . . . . . . . . . 764--777
                   Jian Chu and   
                   Chin-Tau Lea   Optimal link weights for IP-based
                                  networks supporting hose-model VPNs  . . 778--788
               Nicolas Hohn and   
   Konstantina Papagiannaki and   
                  Darryl Veitch   Capturing router congestion and delay    789--802
                Wencheng Lu and   
                   Sartaj Sahni   Succinct representation of static packet
                                  classifiers  . . . . . . . . . . . . . . 803--816
                     Jun Li and   
                Yiqiang Q. Zhao   Resequencing analysis of stop-and-wait
                                  ARQ for parallel multichannel
                                  communications . . . . . . . . . . . . . 817--830
             Vincent Borrel and   
            Franck Legendre and   
     Marcelo Dias De Amorim and   
                    Serge Fdida   SIMPS: using sociology for personal
                                  mobility . . . . . . . . . . . . . . . . 831--842
          Saurabh Ganeriwal and   
        Ilias Tsigkogiannis and   
                Hohyun Shim and   
          Vlassios Tsiatsis and   
         Mani B. Srivastava and   
                 Deepak Ganesan   Estimating clock uncertainty for
                                  efficient duty-cycling in sensor
                                  networks . . . . . . . . . . . . . . . . 843--856
                Sungoh Kwon and   
                 Ness B. Shroff   Analysis of shortest path routing for
                                  large multi-hop wireless networks  . . . 857--869
               Petar Djukic and   
                Shahrokh Valaee   Delay aware link scheduling for
                                  multi-hop TDMA wireless networks . . . . 870--883
         Claudio Cicconetti and   
            Ian F. Akyildiz and   
                Luciano Lenzini   FEBA: a bandwidth allocation algorithm
                                  for service differentiation in IEEE
                                  802.16 mesh networks . . . . . . . . . . 884--897
           Murtaza A. Zafer and   
                  Eytan Modiano   A calculus approach to energy-efficient
                                  data transmission with
                                  quality-of-service constraints . . . . . 898--911
               Chee Wei Tan and   
          Daniel P. Palomar and   
                    Mung Chiang   Energy-robustness tradeoff in cellular
                                  network power control  . . . . . . . . . 912--925
               Kae Won Choi and   
              Wha Sook Jeon and   
                Dong Geun Jeong   Resource allocation in OFDMA wireless
                                  communications systems supporting
                                  multimedia services  . . . . . . . . . . 926--935
           Richard T. B. Ma and   
               Vishal Misra and   
                 Dan Rubenstein   An analysis of generalized slotted-Aloha
                                  protocols  . . . . . . . . . . . . . . . 936--949
                  Xiang-Yang Li   Multicast capacity of wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 950--961
             Yuan-Cheng Lai and   
                 Chih-Chung Lin   Two blocking algorithms on adaptive
                                  binary splitting: single and pair
                                  resolutions for RFID tag identification  962--975
                 Kevin Ross and   
                Nicholas Bambos   Projective cone scheduling (PCS)
                                  algorithms for packet switches of
                                  maximal throughput . . . . . . . . . . . 976--989
                Hung Q. Ngo and   
                  Yang Wang and   
                     Dazhen Pan   Rearrangeable and nonblocking $ [w,
                                  f]$-distributors . . . . . . . . . . . . 990--1001
           Rodney Van Meter and   
           Thaddeus D. Ladd and   
                W. J. Munro and   
                     Kae Nemoto   System design for a long-line quantum
                                  repeater . . . . . . . . . . . . . . . . 1002--1013

IEEE\slash ACM Transactions on Networking
Volume 17, Number 4, August, 2009

             Jonathan S. Turner   Strong performance guarantees for
                                  asynchronous buffered crossbar scheduler 1017--1028
              Banit Agrawal and   
               Timothy Sherwood   High-bandwidth network memory system
                                  through virtual pipelines  . . . . . . . 1029--1041
              Michael Menth and   
   Andreas Binzenhöfer and   
            Stefan Mühleck   Source models for speech traffic
                                  revisited  . . . . . . . . . . . . . . . 1042--1051
           Nazanin Magharei and   
                    Reza Rejaie   PRIME: peer-to-peer receiver-driven
                                  mesh-based streaming . . . . . . . . . . 1052--1065
            Vijay Sivaraman and   
             Hossam Elgindy and   
             David Moreland and   
                 Diethelm Ostry   Packet pacing in small buffer optical
                                  packet switched networks . . . . . . . . 1066--1079
         Satyajeet S. Ahuja and   
 Srinivasan Ramasubramanian and   
                Marwan M. Krunz   Single-link failure detection in
                                  all-optical networks using monitoring
                                  cycles and paths . . . . . . . . . . . . 1080--1093
               Suman Sarkar and   
               Hong-Hsu Yen and   
               Sudhir Dixit and   
            Biswanath Mukherjee   Hybrid wireless-optical broadband access
                                  network (WOBAN): network planning using
                                  Lagrangean relaxation  . . . . . . . . . 1094--1105
                     Pan Li and   
                  Chi Zhang and   
                   Yuguang Fang   Asymptotic connectivity in wireless ad
                                  hoc networks using directional antennas  1106--1117
             Apoorva Jindal and   
           Konstantinos Psounis   The achievable rate region of
                                  802.11-scheduled multihop networks . . . 1118--1131
               Changhee Joo and   
                Xiaojun Lin and   
                 Ness B. Shroff   Understanding the capacity region of the
                                  Greedy maximal scheduling algorithm in
                                  multihop wireless networks . . . . . . . 1132--1145
               Michael J. Neely   Delay analysis for maximal scheduling
                                  with flow control in wireless networks
                                  with bursty traffic  . . . . . . . . . . 1146--1159
              Paramvir Bahl and   
            Ranveer Chandra and   
          Patrick P. C. Lee and   
               Vishal Misra and   
            Jitendra Padhye and   
             Dan Rubenstein and   
                         Yan Yu   Opportunistic use of client repeaters to
                                  improve performance of WLANs . . . . . . 1160--1171
                Kyu-Han Kim and   
                   Kang G. Shin   On accurate and asymmetry-aware
                                  measurement of link quality in wireless
                                  mesh networks  . . . . . . . . . . . . . 1172--1185
            Mehmet C. Vuran and   
                Ian F. Akyildiz   Error control in wireless sensor
                                  networks: a cross layer analysis . . . . 1186--1199
            Shamik Sengupta and   
              Mainak Chatterjee   An economic framework for dynamic
                                  spectrum access and service pricing  . . 1200--1213
              Gwillerm Froc and   
             Issam Mabrouki and   
                Xavier Lagrange   Design and performance of wireless data
                                  gathering networks based on unicast
                                  random walk routing  . . . . . . . . . . 1214--1227
              Ming-Jer Tsai and   
              Hong-Yen Yang and   
              Bing-Hong Liu and   
                 Wen-Qian Huang   Virtual-coordinate-based
                                  delivery-guaranteed routing protocol in
                                  wireless sensor networks . . . . . . . . 1228--1241
                   Joon Ahn and   
         Bhaskar Krishnamachari   Scaling laws for data-centric storage
                                  and querying in wireless sensor networks 1242--1255
                    Ming Li and   
             Deepak Ganesan and   
                Prashant Shenoy   PRESTO: feedback-driven data management
                                  in sensor networks . . . . . . . . . . . 1256--1269
       Martín Casado and   
        Michael J. Freedman and   
              Justin Pettit and   
               Jianying Luo and   
               Natasha Gude and   
               Nick McKeown and   
                  Scott Shenker   Rethinking enterprise network control    1270--1283
          Katerina Argyraki and   
              David R. Cheriton   Scalable network-layer defense against
                                  Internet bandwidth-flooding attacks  . . 1284--1297
             Sabyasachi Roy and   
            Himabindu Pucha and   
                Zheng Zhang and   
              Y. Charlie Hu and   
                       Lili Qiu   On the placement of infrastructure
                                  overlay nodes  . . . . . . . . . . . . . 1298--1311
          Jayakrishnan Nair and   
                   D. Manjunath   Distributed iterative optimal resource
                                  allocation with concurrent updates of
                                  routing and flow control variables . . . 1312--1325
           Hiroyuki Okamura and   
               Tadashi Dohi and   
              Kishor S. Trivedi   Markovian arrival process parameter
                                  estimation with group data . . . . . . . 1326--1339
    Françis Baccelli and   
          Sridhar Machiraju and   
              Darryl Veitch and   
                     Jean Bolot   The role of PASTA in network measurement 1340--1353

IEEE\slash ACM Transactions on Networking
Volume 17, Number 5, October, 2009

               Meeyoung Cha and   
               Haewoon Kwak and   
            Pablo Rodriguez and   
              Yong-Yeol Ahn and   
                       Sue Moon   Analyzing the video popularity
                                  characteristics of large-scale user
                                  generated content systems  . . . . . . . 1357--1370
             Moritz Steiner and   
         Taoufik En-Najjary and   
              Ernst W. Biersack   Long term study of peer behavior in the
                                  KAD DHT  . . . . . . . . . . . . . . . . 1371--1384
                 Yigal Bejerano   Taking the skeletons out of the closets:
                                  a simple and efficient topology
                                  discovery scheme for large Ethernet LANs 1385--1398
          Mudhakar Srivatsa and   
               Arun Iyengar and   
                   Jian Yin and   
                       Ling Liu   Scalable key management algorithms for
                                  location-based services  . . . . . . . . 1399--1412
          Fernando Paganini and   
                Enrique Mallada   A unified approach to congestion control
                                  and node-based multipath routing . . . . 1413--1426
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Guaranteed performance routing of
                                  unpredictable traffic with fast path
                                  restoration  . . . . . . . . . . . . . . 1427--1438
                   Xin Yuan and   
            Wickus Nienaber and   
               Zhenhai Duan and   
                    Rami Melhem   Oblivious routing in fat-tree based
                                  system area networks with uncertain
                                  traffic demands  . . . . . . . . . . . . 1439--1452
               Holger Boche and   
                Martin Schubert   Nash bargaining and proportional
                                  fairness for wireless systems  . . . . . 1453--1466
                 Loc X. Bui and   
             Sujay Sanghavi and   
                     R. Srikant   Distributed link scheduling with
                                  constant overhead  . . . . . . . . . . . 1467--1480
               Changhee Joo and   
                 Ness B. Shroff   Performance of random access scheduling
                                  schemes in multi-hop wireless networks   1481--1493
                Zhenzhen Ye and   
      Alhussein A. Abouzeid and   
                        Jing Ai   Optimal stochastic policies for
                                  distributed data aggregation in wireless
                                  sensor networks  . . . . . . . . . . . . 1494--1507
                     Yan Wu and   
                Sonia Fahmy and   
                 Ness B. Shroff   Optimal sleep/wake scheduling for
                                  time-synchronized sensor networks with
                                  QoS guarantees . . . . . . . . . . . . . 1508--1521
            Michele Garetto and   
             Paolo Giaccone and   
                Emilio Leonardi   Capacity scaling in ad hoc networks with
                                  heterogeneous mobile nodes: the
                                  super-critical regime  . . . . . . . . . 1522--1535
                  Suli Zhao and   
          Dipankar Raychaudhuri   Scalability and performance evaluation
                                  of hierarchical hybrid wireless networks 1536--1549
                     Hui Ma and   
          Rajiv Vijayakumar and   
                  Sumit Roy and   
                       Jing Zhu   Optimizing 802.11 wireless mesh networks
                                  based on physical carrier sensing  . . . 1550--1563
                Wei-Jen Hsu and   
   Thrasyvoulos Spyropoulos and   
       Konstantinos Psounis and   
                    Ahmed Helmy   Modeling spatial and temporal
                                  dependencies of user mobility in
                                  wireless mobile networks . . . . . . . . 1564--1577
                    Han Cai and   
                   Do Young Eun   Crossing over the bounded domain: from
                                  exponential to power-law intermeeting
                                  time in mobile ad hoc networks . . . . . 1578--1591
                   Wei Wang and   
               Mehul Motani and   
              Vikram Srinivasan   Opportunistic energy-efficient contact
                                  probing in delay-tolerant applications   1592--1605
           Soung Chang Liew and   
             Ying Jun Zhang and   
                    Da Rui Chen   Bounded-mean-delay throughput and
                                  nonstarvation conditions in Aloha
                                  network  . . . . . . . . . . . . . . . . 1606--1618
     Stefan Alexandru Pascu and   
              Ahmed A. El-Amawy   On conflict-free all-to-all broadcast in
                                  one-hop optical networks of arbitrary
                                  topologies . . . . . . . . . . . . . . . 1619--1630
             Michel Mandjes and   
             Remco Van De Meent   Resource dimensioning through buffer
                                  sampling . . . . . . . . . . . . . . . . 1631--1644
             Ravi S. Prasad and   
       Constantine Dovrolis and   
                 Marina Thottan   Router buffer sizing for TCP traffic and
                                  the role of the output/input capacity
                                  ratio  . . . . . . . . . . . . . . . . . 1645--1658
                Chao-Lin Yu and   
          Cheng-Shang Chang and   
                  Duan-Shin Lee   CR switch: a load-balanced switch with
                                  contention and reservation . . . . . . . 1659--1671
        Georgios Y. Lazarou and   
                 Julie Baca and   
            Victor S. Frost and   
                Joseph B. Evans   Describing network traffic using the
                                  index of variability . . . . . . . . . . 1672--1683
               Reuven Cohen and   
        Niloofar Fazlollahi and   
              David Starobinski   Path switching and grading algorithms
                                  for advance channel reservation
                                  architectures  . . . . . . . . . . . . . 1684--1695

IEEE\slash ACM Transactions on Networking
Volume 17, Number 6, December, 2009

       Lachlan L. H. Andrew and   
              Steven H. Low and   
            Bartek P. Wydrowski   Understanding XCP: equilibrium and
                                  fairness . . . . . . . . . . . . . . . . 1697--1710
        Jerry Chi-Yuan Chou and   
                   Bill Lin and   
             Subhabrata Sen and   
              Oliver Spatscheck   Proactive surge protection: a defense
                                  mechanism for bandwidth-based attacks    1711--1723
                   Yao Zhao and   
                   Yan Chen and   
                   David Bindel   Towards unbiased end-to-end network
                                  diagnosis  . . . . . . . . . . . . . . . 1724--1737
            Mehmet H. Gunes and   
                    Kamil Sarac   Resolving IP aliases in building
                                  traceroute-based Internet maps . . . . . 1738--1751
                  Ao-Jan Su and   
          David R. Choffnes and   
      Aleksandar Kuzmanovic and   
    Fabián E. Bustamante   Drafting behind Akamai: inferring
                                  network conditions based on CDN
                                  redirections . . . . . . . . . . . . . . 1752--1765
         Michael Sirivianos and   
               Xiaowei Yang and   
              Stanislaw Jarecki   Robust and efficient incentives for
                                  cooperative content distribution . . . . 1766--1779
          George N. Rouskas and   
                Nikhil Baradwaj   On bandwidth tiered service  . . . . . . 1780--1793
              Huseyin Mutlu and   
             Murat Alanyali and   
              David Starobinski   Spot pricing of secondary spectrum
                                  access in wireless cellular networks . . 1794--1804
          Nicholas B. Chang and   
                    Mingyan Liu   Optimal channel probing and transmission
                                  scheduling for opportunistic spectrum
                                  access . . . . . . . . . . . . . . . . . 1805--1818
       Shrutivandana Sharma and   
         Demosthenis Teneketzis   An externalities-based decentralized
                                  optimal power allocation algorithm for
                                  wireless networks  . . . . . . . . . . . 1819--1831
              Omer Gurewitz and   
           Vincenzo Mancuso and   
                 Jingpu Shi and   
             Edward W. Knightly   Measurement and modeling of the origins
                                  of starvation of congestion-controlled
                                  flows in wireless mesh networks  . . . . 1832--1845
              Abhinav Gupta and   
                Xiaojun Lin and   
                     R. Srikant   Low-complexity distributed scheduling
                                  algorithms for wireless networks . . . . 1846--1859
          Mahdi Lotfinezhad and   
                  Ben Liang and   
                Elvino S. Sousa   On stability region and delay
                                  performance of linear-memory randomized
                                  scheduling for time-varying networks . . 1860--1873
                Xiaojun Lin and   
             Shahzada B. Rasool   Distributed and provably efficient
                                  algorithms for joint channel-assignment,
                                  scheduling, and routing in multichannel
                                  ad hoc wireless networks . . . . . . . . 1874--1887
            Michele Garetto and   
             Paolo Giaccone and   
                Emilio Leonardi   Capacity scaling in ad hoc networks with
                                  heterogeneous mobile nodes: the
                                  subcritical regime . . . . . . . . . . . 1888--1901
                 Rik Sarkar and   
                Xianjin Zhu and   
                        Jie Gao   Double rulings for information brokerage
                                  in sensor networks . . . . . . . . . . . 1902--1915
    Christopher J. Martinez and   
           Devang K. Pandya and   
                   Wei-Ming Lin   On designing fast nonuniformly
                                  distributed IP address lookup hashing
                                  algorithms . . . . . . . . . . . . . . . 1916--1925
                  Lynn Choi and   
                 Hyogon Kim and   
                  Sunil Kim and   
                   Moon Hae Kim   Scalable packet classification through
                                  rulebase partitioning using the maximum
                                  entropy hashing  . . . . . . . . . . . . 1926--1935
                Mario Baldi and   
                Guido Marchetto   Pipeline forwarding of packets based on
                                  a low-accuracy network-distributed
                                  common time reference  . . . . . . . . . 1936--1949
              Michael Menth and   
             Michael Duelli and   
            Ruediger Martin and   
                 Jens Milbrandt   Resilience analysis of packet-switched
                                  communication networks . . . . . . . . . 1950--1963
          Srini Seetharaman and   
                Volker Hilt and   
             Markus Hofmann and   
                  Mostafa Ammar   Resolving cross-layer conflict between
                                  overlay routing and traffic engineering  1964--1977
                Amir Gourgy and   
           Ted H. Szymanski and   
                Douglas G. Down   On tracking the behavior of an
                                  output-queued switch using an
                                  input-queued switch  . . . . . . . . . . 1978--1988
                  Smita Rai and   
              Ching-Fong Su and   
            Biswanath Mukherjee   On provisioning in all-optical networks:
                                  an impairment-aware approach . . . . . . 1989--2001
                Onur Turkcu and   
             Suresh Subramaniam   Performance of optical networks with
                                  limited reconfigurability  . . . . . . . 2002--2013
               Yi-Ting Chen and   
                  Jay Cheng and   
                  Duan-Shin Lee   Constructions of linear compressors,
                                  nonovertaking delay lines, and flexible
                                  delay lines for optical packet switching 2014--2027


IEEE\slash ACM Transactions on Networking
Volume 18, Number 1, February, 2010

                  Guohan Lu and   
                   Yan Chen and   
              Stefan Birrer and   
Fabián E. Bustamante and   
                        Xing Li   POPI: a user-level tool for inferring
                                  router packet forwarding priority  . . . 1--14
               Reuven Cohen and   
                   Liran Katzir   Computational analysis and efficient
                                  algorithms for micro and macro OFDMA
                                  downlink scheduling  . . . . . . . . . . 15--26
               Sanghwan Lee and   
               Zhi-Li Zhang and   
                Sambit Sahu and   
                  Debanjan Saha   On suitability of Euclidean embedding
                                  for host-based network coordinate
                                  systems  . . . . . . . . . . . . . . . . 27--40
             Jren-Chit Chin and   
                    Yu Dong and   
               Wing-Kai Hon and   
            Chris Yu-Tak Ma and   
                David K. Y. Yau   Detection of intelligent mobile target
                                  in a mobile sensor network . . . . . . . 41--52
                Lanjia Wang and   
                 Zhichun Li and   
                   Yan Chen and   
                     Zhi Fu and   
                        Xing Li   Thwarting zero-day polymorphic worms
                                  with network-level length-based
                                  signature generation . . . . . . . . . . 53--66
                 Ahmed E. Kamal   $ 1 + N $ network protection for mesh
                                  networks: network coding-based
                                  protection using $p$-cycles  . . . . . . 67--80
                  Fong Pong and   
                Nian-Feng Tzeng   SUSE: superior storage-efficiency for
                                  routing tables through prefix
                                  transformation and aggregation . . . . . 81--94
         Stefan Rührup and   
              Hanna Kalosha and   
                Amiya Nayak and   
             Ivan Stojmenovi\'c   Message-efficient beaconless georouting
                                  with guaranteed delivery in wireless
                                  sensor, ad hoc, and actuator networks    95--108
           Ricardo Oliveira and   
                    Dan Pei and   
           Walter Willinger and   
             Beichuan Zhang and   
                    Lixia Zhang   The (in)completeness of the observed
                                  Internet AS-level structure  . . . . . . 109--122
                    Jian Ni and   
                Haiyong Xie and   
           Sekhar Tatikonda and   
              Yang Richard Yang   Efficient and dynamic routing topology
                                  inference from end-to-end measurements   123--135
             Steven Chamberland   Global access network evolution  . . . . 136--149
                    Zhen Yu and   
                      Yong Guan   A dynamic en-route filtering scheme for
                                  data reporting in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 150--163
                 Damien Fay and   
              Hamed Haddadi and   
            Andrew Thomason and   
            Andrew W. Moore and   
            Richard Mortier and   
         Almerima Jamakovic and   
                Steve Uhlig and   
                     Miguel Rio   Weighted spectral distribution for
                                  Internet topology analysis: theory and
                                  applications . . . . . . . . . . . . . . 164--176
              Yuichi Ohsita and   
           Takashi Miyamura and   
          Shin'ichi Arakawa and   
                 Shingo Ata and   
                   Eiji Oki and   
             Kohei Shiomoto and   
                Masayuki Murata   Gradually reconfiguring virtual network
                                  topologies based on estimated traffic
                                  matrices . . . . . . . . . . . . . . . . 177--189
           Behnam A. Rezaei and   
               Nima Sarshar and   
          Vwani P. Roychowdhury   Distributed resource sharing in
                                  low-latency wireless ad hoc networks . . 190--201
                    Tao Shu and   
                   Marwan Krunz   Coverage-time optimization for clustered
                                  wireless sensor networks: a
                                  power-balancing approach . . . . . . . . 202--215
         Jonathan L. Bredin and   
            Erik D. Demaine and   
  Mohammad Taghi Hajiaghayi and   
                    Daniela Rus   Deploying sensor networks with
                                  guaranteed fault tolerance . . . . . . . 216--228
                   Bo Zhang and   
         Tze Sing Eugene Ng and   
              Animesh Nandi and   
            Rudolf H. Riedi and   
             Peter Druschel and   
                    Guohui Wang   Measurement-based analysis, modeling,
                                  and synthesis of the Internet delay
                                  space  . . . . . . . . . . . . . . . . . 229--242
               Lap Kong Law and   
   Konstantinos Pelechrinis and   
  Srikanth V. Krishnamurthy and   
             Michalis Faloutsos   Downlink capacity of hybrid cellular ad
                                  hoc networks . . . . . . . . . . . . . . 243--256
              Xiaoming Wang and   
                Dmitri Loguinov   Understanding and modeling the Internet
                                  topology: economics and evolution
                                  perspective  . . . . . . . . . . . . . . 257--270
   Balagangadhar G. Bathula and   
             Vinod M. Vokkarane   QoS-based manycasting over optical
                                  burst-switched (OBS) networks  . . . . . 271--283
                     Bin Wu and   
              Kwan L. Yeung and   
                     Pin-Han Ho   ILP formulations for $p$-cycle design
                                  without candidate cycle enumeration  . . 284--295
            Rajgopal Kannan and   
             Shuangqing Wei and   
          Vasu Chakravarthy and   
          Muralidhar Rangaswamy   Approximation algorithms for minimum
                                  energy transmission scheduling in rate
                                  and duty-cycle constrained wireless
                                  networks . . . . . . . . . . . . . . . . 296--306
                 Saikat Ray and   
         Roch Guérin and   
              Kin-Wah Kwong and   
                     Rute Sofia   Always acyclic distributed path
                                  computation  . . . . . . . . . . . . . . 307--319
                      Mo Li and   
                     Yunhao Liu   Rendered path: range-free localization
                                  in anisotropic sensor networks with
                                  holes  . . . . . . . . . . . . . . . . . 320--332

IEEE\slash ACM Transactions on Networking
Volume 18, Number 2, April, 2010

           Gireesh Shrimali and   
              Aditya Akella and   
                 Almir Mutapcic   Cooperative interdomain traffic
                                  engineering using Nash bargaining and
                                  decomposition  . . . . . . . . . . . . . 341--352
              Dragos Andrei and   
          Massimo Tornatore and   
            Marwan Batayneh and   
          Charles U. Martel and   
            Biswanath Mukherjee   Provisioning of deadline-driven requests
                                  with flexible transmission rates in WDM
                                  mesh networks  . . . . . . . . . . . . . 353--366
                Amit Mondal and   
          Aleksandar Kuzmanovic   Upgrading mice to elephants: effects and
                                  end-point solutions  . . . . . . . . . . 367--378
                  Yufang Xi and   
                  Edmund M. Yeh   Distributed algorithms for minimum cost
                                  multicast with network coding  . . . . . 379--392
            Gagan Raj Gupta and   
                 Ness B. Shroff   Delay analysis for wireless networks
                                  with single hop traffic and general
                                  interference constraints . . . . . . . . 393--405
               Longbo Huang and   
               Michael J. Neely   The optimality of two prices: maximizing
                                  revenue in a stochastic communication
                                  system . . . . . . . . . . . . . . . . . 406--419
      Bo\vzidar Radunovi\'c and   
        Christos Gkantsidis and   
                  Peter Key and   
                Pablo Rodriguez   Toward practical opportunistic routing
                                  with intra-session network coding for
                                  mesh networks  . . . . . . . . . . . . . 420--433
          Satyajayant Misra and   
             Seung Don Hong and   
               Guoliang Xue and   
                      Jian Tang   Constrained relay node placement in
                                  wireless sensor networks: formulation
                                  and approximations . . . . . . . . . . . 434--447
               Nadim Parvez and   
            Anirban Mahanti and   
               Carey Williamson   An analytic throughput model for TCP
                                  NewReno  . . . . . . . . . . . . . . . . 448--461
            Ashraf Al Daoud and   
             Murat Alanyali and   
              David Starobinski   Pricing strategies for spectrum lease in
                                  secondary markets  . . . . . . . . . . . 462--475
        Srinivas Shakkottai and   
                  Ramesh Johari   Demand-aware content distribution on the
                                  Internet . . . . . . . . . . . . . . . . 476--489
                Alex X. Liu and   
            Chad R. Meiners and   
                     Eric Torng   TCAM Razor: a systematic approach
                                  towards minimizing packet classifiers in
                                  TCAMs  . . . . . . . . . . . . . . . . . 490--500
                 Longbi Lin and   
                Xiaojun Lin and   
                 Ness B. Shroff   Low-complexity and distributed energy
                                  minimization in multihop wireless
                                  networks . . . . . . . . . . . . . . . . 501--514
                Joohwan Kim and   
                Xiaojun Lin and   
             Ness B. Shroff and   
                   Prasun Sinha   Minimizing delay and maximizing lifetime
                                  for wireless sensor networks with
                                  anycast  . . . . . . . . . . . . . . . . 515--528
              Si Qing Zheng and   
             Ashwin Gumaste and   
                      Hong Shen   A parallel self-routing rearrangeable
                                  nonblocking multi-$ \log_2 N $ photonic
                                  switching network  . . . . . . . . . . . 529--539
          Ilenia Tinnirello and   
               Giuseppe Bianchi   Rethinking the IEEE 802.11e EDCA
                                  performance modeling methodology . . . . 540--553
          Nilanjan Banerjee and   
             Mark D. Corner and   
              Brian Neil Levine   Design and field experimentation of an
                                  energy-efficient architecture for DTN
                                  throwboxes . . . . . . . . . . . . . . . 554--567
               Reuven Cohen and   
                   Gabi Nakibly   Maximizing restorable throughput in MPLS
                                  networks . . . . . . . . . . . . . . . . 568--581
                Sheng Zhong and   
                         Fan Wu   A collusion-resistant routing scheme for
                                  noncooperative wireless ad hoc networks  582--595
      Aruna Balasubramanian and   
          Brian Neil Levine and   
             Arun Venkataramani   Replication routing in DTNs: a resource
                                  allocation approach  . . . . . . . . . . 596--609
            Mohamed Hefeeda and   
                 Cheng-Hsin Hsu   On burst transmission scheduling in
                                  mobile TV broadcast networks . . . . . . 610--623
            Chuan-Ching Sue and   
               Hsaing-Wen Cheng   A fitting report position scheme for the
                                  gated IPACT dynamic bandwidth algorithm
                                  in EPONs . . . . . . . . . . . . . . . . 624--637
            Atilla Eryilmaz and   
            Asuman Ozdaglar and   
              Devavrat Shah and   
                  Eytan Modiano   Distributed cross-layer algorithms for
                                  the optimal control of multihop wireless
                                  networks . . . . . . . . . . . . . . . . 638--651
               Joel Sommers and   
               Paul Barford and   
              Nick Duffield and   
                       Amos Ron   Multiobjective monitoring for SLA
                                  compliance . . . . . . . . . . . . . . . 652--665
             Ionut Trestian and   
         Supranamaya Ranjan and   
      Aleksandar Kuzmanovic and   
                  Antonio Nucci   Googling the Internet: profiling
                                  Internet endpoints via the World Wide
                                  Web  . . . . . . . . . . . . . . . . . . 666--679

IEEE\slash ACM Transactions on Networking
Volume 18, Number 3, June, 2010

             Cheng-Hsin Hsu and   
             Mohamed M. Hefeeda   Broadcasting video streams encoded with
                                  arbitrary bit rates in
                                  energy-constrained mobile TV networks    681--694
          David Starobinski and   
                    Weiyao Xiao   Asymptotically optimal data
                                  dissemination in multichannel wireless
                                  sensor networks: single radios suffice   695--707
                 Martin Karsten   Approximation of generalized processor
                                  sharing with interleaved stratified
                                  timer wheels . . . . . . . . . . . . . . 708--721
           Ioannis Broustis and   
   Konstantina Papagiannaki and   
  Srikanth V. Krishnamurthy and   
         Michalis Faloutsos and   
                Vivek P. Mhatre   Measurement-driven guidelines for 802.11
                                  WLAN design  . . . . . . . . . . . . . . 722--735
               Suat Ozdemir and   
               Hasan Çam   Integration of false data detection with
                                  data aggregation and confidential
                                  transmission in wireless sensor networks 736--749
          Nina Skorin-Kapov and   
                Jiajia Chen and   
                  Lena Wosinska   A new approach to optical networks
                                  security: attack-aware routing and
                                  wavelength assignment  . . . . . . . . . 750--760
                    Yun Mao and   
                  Feng Wang and   
                   Lili Qiu and   
                  Simon Lam and   
                 Jonathan Smith   S4: small state and small stretch
                                  compact routing protocol for large
                                  static wireless networks . . . . . . . . 761--774
           Richard T. B. Ma and   
              Dah Ming Chiu and   
             John C. S. Lui and   
               Vishal Misra and   
                 Dan Rubenstein   Internet economics: the use of Shapley
                                  value for ISP settlement . . . . . . . . 775--787
       V. J. Venkataramanan and   
                    Xiaojun Lin   On wireless scheduling algorithms for
                                  minimizing the queue-overflow
                                  probability  . . . . . . . . . . . . . . 788--801
               Hongseok Kim and   
             Gustavo De Veciana   Leveraging dynamic spare capacity in
                                  wireless systems to conserve mobile
                                  terminals' energy  . . . . . . . . . . . 802--815
         Abdallah Khreishah and   
             Chih-Chun Wang and   
                 Ness B. Shroff   Rate control with pairwise intersession
                                  network coding . . . . . . . . . . . . . 816--829
Enrique Campos-Náñez   Decentralized algorithms for adaptive
                                  pricing in multiclass loss networks  . . 830--843
                    Ao Tang and   
              Xiaoliang Wei and   
              Steven H. Low and   
                    Mung Chiang   Equilibrium of heterogeneous congestion
                                  control: optimality and stability  . . . 844--857
        Parbati Kumar Manna and   
               Shigang Chen and   
                   Sanjay Ranka   Inside the permutation-scanning worms:
                                  propagation modeling and analysis  . . . 858--870
                    Jun Luo and   
             Jean-Pierre Hubaux   Joint sink mobility and routing to
                                  maximize the lifetime of wireless sensor
                                  networks: the case of constrained
                                  mobility . . . . . . . . . . . . . . . . 871--884
                 Haifeng Yu and   
         Phillip B. Gibbons and   
           Michael Kaminsky and   
                      Feng Xiao   SybilLimit: a near-optimal social
                                  network defense against Sybil attacks    885--898
             Chris Chambers and   
              Wu-Chang Feng and   
                Sambit Sahu and   
              Debanjan Saha and   
                   David Brandt   Characterizing online games  . . . . . . 899--910
              Cesare Roseti and   
             Michele Luglio and   
           Francesco Zampognaro   Analysis and performance evaluation of a
                                  burst-based TCP for satellite DVB RCS
                                  links  . . . . . . . . . . . . . . . . . 911--921
                 Qingya She and   
             Xiaodong Huang and   
                   Jason P. Jue   How reliable can two-path protection be? 922--933
                  Ziqiu Yun and   
                 Xiaole Bai and   
                  Dong Xuan and   
                 Ten H. Lai and   
                     Weijia Jia   Optimal deployment patterns for full
                                  coverage and $k$-connectivity ($ k <= 6$)
                                  wireless sensor networks . . . . . . . . 934--947
                Wencheng Lu and   
                   Sartaj Sahni   Low-power TCAMs for very large
                                  forwarding tables  . . . . . . . . . . . 948--959
                Libin Jiang and   
                   Jean Walrand   A distributed CSMA algorithm for
                                  throughput and utility maximization in
                                  wireless networks  . . . . . . . . . . . 960--972
               Ritesh Madan and   
            Stephen P. Boyd and   
                    Sanjay Lall   Fast algorithms for resource allocation
                                  in wireless cellular networks  . . . . . 973--984
                Ori Gerstel and   
                      G. Sasaki   A general framework for service
                                  availability for bandwidth-efficient
                                  connection-oriented networks . . . . . . 985--995
                 Chun-I Fan and   
                Pei-Hsiu Ho and   
                   Ruei-Hau Hsu   Provably secure nested one-time secret
                                  mechanisms for fast mutual
                                  authentication and key exchange in
                                  mobile communications  . . . . . . . . . 996--1009

IEEE\slash ACM Transactions on Networking
Volume 18, Number 4, August, 2010

           Milan Vojnovi\'c and   
                Varun Gupta and   
         Thomas Karagiannis and   
            Christos Gkantsidis   Sampling strategies for epidemic-style
                                  information dissemination  . . . . . . . 1013--1025
              Mariyam Mirza and   
               Joel Sommers and   
               Paul Barford and   
                    Xiaojin Zhu   A machine learning approach to TCP
                                  throughput prediction  . . . . . . . . . 1026--1039
        Jörg Liebeherr and   
              Markus Fidler and   
                Shahrokh Valaee   A system-theoretic approach to bandwidth
                                  estimation . . . . . . . . . . . . . . . 1040--1053
                  Yufang Xi and   
                  Edmund M. Yeh   Throughput optimal distributed power
                                  control of stochastic wireless networks  1054--1066
                   Song Guo and   
             Victor C. M. Leung   A distributed algorithm for min-max tree
                                  and max-min cut problems in
                                  communication networks . . . . . . . . . 1067--1076
                    Bing Hu and   
                  Kwan L. Yeung   Feedback-based scheduling for
                                  load-balanced two-stage switches . . . . 1077--1090
                    Ming Yu and   
                   Mengchu Zhou   A performance modeling scheme for
                                  multistage switch networks with
                                  phase-type and bursty traffic  . . . . . 1091--1104
          Sriram Lakshmanan and   
             Cheng-Lin Tsao and   
           Raghupathy Sivakumar   Aegis: physical space security for
                                  wireless networks with smart antennas    1105--1118
               Yanming Shen and   
        Shivendra S. Panwar and   
               H. Jonathan Chao   SQUID: a practical 100% throughput
                                  scheduler for crosspoint buffered
                                  switches . . . . . . . . . . . . . . . . 1119--1131
                 Yunhao Liu and   
                  Kebin Liu and   
                          Mo Li   Passive diagnosis for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1132--1144
              Xiang-Yang Li and   
                 Yunhao Liu and   
                     Shi Li and   
                   ShaoJie Tang   Multicast capacity of wireless ad hoc
                                  networks under Gaussian channel model    1145--1157
           Sudipta Sengupta and   
           Shravan Rayanchu and   
                 Suman Banerjee   Network coding-aware routing in wireless
                                  networks . . . . . . . . . . . . . . . . 1158--1170
              Murtaza Zafer and   
                Bong Jun Ko and   
               Ivan Wang-Hei Ho   Transmit power estimation using
                                  spatially diverse measurements under
                                  wireless fading  . . . . . . . . . . . . 1171--1180
    Haythem A. Bany Salameh and   
               Marwan Krunz and   
                  Ossama Younis   Cooperative adaptive spectrum sharing in
                                  cognitive radio networks . . . . . . . . 1181--1194
                       Yong Liu   Delay bounds of chunk-based peer-to-peer
                                  video streaming  . . . . . . . . . . . . 1195--1206
                Can Emre Koksal   Rate quantization and the speedup
                                  required to achieve 100% throughput for
                                  multicast over crossbar switches . . . . 1207--1219
             Hassan Gobjuka and   
              Yuri J. Breitbart   Ethernet topology discovery for networks
                                  with incomplete information  . . . . . . 1220--1233
        Zubair M. Fadlullah and   
                Tarik Taleb and   
    Athanasios V. Vasilakos and   
             Mohsen Guizani and   
                       Nei Kato   DTRAB: combating against attacks on
                                  encrypted protocols through
                                  traffic-feature analysis . . . . . . . . 1234--1247
                      Di Wu and   
                   Yong Liu and   
                  Keith W. Ross   Modeling and analysis of multichannel
                                  P2P live video systems . . . . . . . . . 1248--1260
            Patrick Loiseau and   
     Paulo Gonçalves and   
          Guillaume Dewaele and   
             Pierre Borgnat and   
               Patrice Abry and   
     Pascale Vicat-Blanc Primet   Investigating self-similarity and
                                  heavy-tailed distributions on a
                                  large-scale experimental facility  . . . 1261--1274
              Mario Barbera and   
             Alfio Lombardo and   
            Carla Panarello and   
              Giovanni Schembra   Queue stability analysis and performance
                                  evaluation of a TCP-compliant window
                                  management mechanism . . . . . . . . . . 1275--1288
       Kishore Ramachandran and   
                 Ravi Kokku and   
              Honghai Zhang and   
                 Marco Gruteser   Symphony: synchronous two-phase rate and
                                  power control in 802.11 WLANs  . . . . . 1289--1302
                 Lijun Chen and   
              Steven H. Low and   
                  John C. Doyle   Random access game and medium access
                                  control design . . . . . . . . . . . . . 1303--1316
             Changchuan Yin and   
                   Long Gao and   
                   Shuguang Cui   Scaling laws for overlaid wireless
                                  networks: a cognitive radio network
                                  versus a primary network . . . . . . . . 1317--1329
                   Bill Lin and   
                 Isaac Keslassy   The concurrent matching switch
                                  architecture . . . . . . . . . . . . . . 1330--1343

IEEE\slash ACM Transactions on Networking
Volume 18, Number 5, October, 2010

                Xiaolong Li and   
         Homayoun Yousefi'zadeh   Analysis, simulation, and implementation
                                  of VCP: a wireless profiling . . . . . . 1345--1358
          Mikhail Afanasyev and   
                Tsuwei Chen and   
        Geoffrey M. Voelker and   
                Alex C. Snoeren   Usage patterns in an urban WiFi network  1359--1372
           Shervan Fashandi and   
        Shahab Oveis Gharan and   
               Amir K. Khandani   Path diversity over packet switched
                                  networks: performance analysis and rate
                                  allocation . . . . . . . . . . . . . . . 1373--1386
                    Jun Luo and   
        Catherine Rosenberg and   
            André Girard   Engineering wireless mesh networks:
                                  joint scheduling, routing, power
                                  control, and rate adaptation . . . . . . 1387--1400
          Leonard H. Grokop and   
                David N. C. Tse   Spectrum sharing between wireless
                                  networks . . . . . . . . . . . . . . . . 1401--1412
              Irene Y. Chen and   
                 Li-Da Tong and   
                  Yi-Ming Huang   Rearrangeable nonblocking optical
                                  interconnection network fabrics with
                                  crosstalk constraints  . . . . . . . . . 1413--1421
                    Ao Tang and   
       Lachlan L. H. Andrew and   
          Krister Jacobsson and   
          Karl H. Johansson and   
    Håkan Hjalmarsson and   
                  Steven H. Low   Queue dynamics with window flow control  1422--1435
                S. Q. Zheng and   
              Jianping Wang and   
                  Bing Yang and   
                       Mei Yang   Minimum-cost multiple paths subject to
                                  minimum link and node sharing in a
                                  network  . . . . . . . . . . . . . . . . 1436--1449
       Utku Günay Acer and   
     Shivkumar Kalyanaraman and   
          Alhussein A. Abouzeid   Weak state routing for large-scale
                                  dynamic networks . . . . . . . . . . . . 1450--1463
P. S. Chandrashekhar Thejaswi and   
              Junshan Zhang and   
                 Man-On Pun and   
            H. Vincent Poor and   
                     Dong Zheng   Distributed opportunistic scheduling
                                  with two-level probing . . . . . . . . . 1464--1477
                  Eli Brosh and   
         Salman Abdul Baset and   
               Vishal Misra and   
             Dan Rubenstein and   
            Henning Schulzrinne   The delay-friendliness of TCP for
                                  real-time traffic  . . . . . . . . . . . 1478--1491
   Madanagopal Ramachandran and   
               N. Usha Rani and   
           Timothy A. Gonsalves   Path computation algorithms for dynamic
                                  service provisioning with protection and
                                  inverse multiplexing in SDH/SONET
                                  networks . . . . . . . . . . . . . . . . 1492--1504
        Alessandro Finamore and   
               Marco Mellia and   
                Michela Meo and   
                    Dario Rossi   KISS: stochastic packet inspection
                                  classifier for UDP traffic . . . . . . . 1505--1515
       Domenico Giustiniano and   
               David Malone and   
           Douglas J. Leith and   
       Konstantina Papagiannaki   Measuring transmission opportunities in
                                  802.11 links . . . . . . . . . . . . . . 1516--1529
              Eyuphan Bulut and   
                Zijian Wang and   
       Boleslaw Karol Szymanski   Cost-effective multiperiod spraying for
                                  routing in delay-tolerant networks . . . 1530--1543
     MohammadHossein Bateni and   
           Alexandre Gerber and   
   MohammadTaghi Hajiaghayi and   
                 Subhabrata Sen   Multi-VPN optimization for scalable
                                  routing via relaying . . . . . . . . . . 1544--1556
Konstantinos Christodoulopoulos and   
    Konstantinos Manousakis and   
           Emmanouel Varvarigos   Offline routing and wavelength
                                  assignment in transparent WDM networks   1557--1570
                     Yan Wu and   
                Zhoujia Mao and   
                Sonia Fahmy and   
                 Ness B. Shroff   Constructing maximum-lifetime data
                                  gathering forests in sensor networks . . 1571--1584
               Tianxiong Ji and   
  Eleftheria Athanasopoulou and   
                     R. Srikant   On optimal scheduling algorithms for
                                  small generalized switches . . . . . . . 1585--1598
              Neda Beheshti and   
           Emily Burmeister and   
             Yashar Ganjali and   
             John E. Bowers and   
       Daniel J. Blumenthal and   
                   Nick McKeown   Optical packet buffers for backbone
                                  Internet routers . . . . . . . . . . . . 1599--1609
                   Shan Chu and   
                       Xin Wang   Opportunistic and cooperative spatial
                                  multiplexing in MIMO ad hoc networks . . 1610--1623
               Giusi Alfano and   
            Michele Garetto and   
            Emilio Leonardi and   
              Valentina Martina   Capacity scaling of wireless networks
                                  with inhomogeneous node density: lower
                                  bounds . . . . . . . . . . . . . . . . . 1624--1636
                    Yung Yi and   
         Gustavo De Veciana and   
              Sanjay Shakkottai   MAC scheduling with low overheads by
                                  learning neighborhood contention
                                  patterns . . . . . . . . . . . . . . . . 1637--1650
        Agostino Forestiero and   
            Emilio Leonardi and   
          Carlo Mastroianni and   
                    Michela Meo   Self-chord: a bio-inspired P2P framework
                                  for self-organizing distributed systems  1651--1664
          Anat Bremler-Barr and   
                  David Hay and   
              Danny Hendler and   
                    Ron M. Roth   PEDS: a parallel error detection scheme
                                  for TCAM devices . . . . . . . . . . . . 1665--1675

IEEE\slash ACM Transactions on Networking
Volume 18, Number 6, December, 2010

          Nizar Bouabdallah and   
                Rami Langar and   
                  Raouf Boutaba   Design and analysis of mobility-aware
                                  clustering algorithms for wireless mesh
                                  networks . . . . . . . . . . . . . . . . 1677--1690
        Srinivas Shakkottai and   
                    Xin Liu and   
                     R. Srikant   The multicast capacity of large multihop
                                  wireless networks  . . . . . . . . . . . 1691--1700
          Douglas M. Blough and   
                   G. Resta and   
                       P. Santi   Approximation algorithms for wireless
                                  link scheduling with SINR-based
                                  interference . . . . . . . . . . . . . . 1701--1712
            Sastry Kompella and   
     Jeffrey E. Wieselthier and   
         Anthony Ephremides and   
           Hanif D. Sherali and   
                  Gam D. Nguyen   On optimal SINR-based scheduling in
                                  multihop wireless networks . . . . . . . 1713--1724
              Nikhil Shetty and   
            Galina Schwartz and   
                   Jean Walrand   Internet QoS and regulations . . . . . . 1725--1737
            Young Myoung Ko and   
               Natarajan Gautam   Epidemic-based information dissemination
                                  in wireless mobile sensor networks . . . 1738--1751
                Adam Kirsch and   
           Michael Mitzenmacher   The power of one move: hashing schemes
                                  for hardware . . . . . . . . . . . . . . 1752--1765
                  Ali Tajer and   
                  Xiaodong Wang   Multiuser diversity gain in cognitive
                                  networks . . . . . . . . . . . . . . . . 1766--1779
               Ashima Gupta and   
             Debalina Ghosh and   
              Prasant Mohapatra   Scheduling prioritized services in
                                  multihop OFDMA networks  . . . . . . . . 1780--1792
                 Soumya Sen and   
                Youngmi Jin and   
         Roch Guérin and   
               Kartik Hosanagar   Modeling the dynamics of network
                                  technology adoption and the role of
                                  converters . . . . . . . . . . . . . . . 1793--1805
                 Zheng Yang and   
                 Yunhao Liu and   
                  Xiang-Yang Li   Beyond trilateration: on the
                                  localizability of wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1806--1814
                Zheng Zhang and   
                 Ying Zhang and   
              Y. Charlie Hu and   
              Z. Morley Mao and   
                     Randy Bush   iSPY: detecting IP prefix hijacking on
                                  my own . . . . . . . . . . . . . . . . . 1815--1828
                  Yong Liao and   
                  Lixin Gao and   
         Roch Guérin and   
                   Zhi-Li Zhang   Safe interdomain routing under diverse
                                  commercial agreements  . . . . . . . . . 1829--1840
         Gaurav S. Kasbekar and   
                 Saswati Sarkar   Spectrum auction framework for access
                                  allocation in cognitive radio networks   1841--1854
            Diana Berbecaru and   
            Luca Albertalli and   
                   Antonio Lioy   The ForwardDiffsig scheme for multicast
                                  authentication . . . . . . . . . . . . . 1855--1868
          Mohammad A. Saleh and   
                 Ahmed E. Kamal   Design and provisioning of WDM networks
                                  with many-to-many traffic grooming . . . 1869--1882
              Diego Lucerna and   
          Massimo Tornatore and   
              Achille Pattavina   Algorithms and models for backup
                                  reprovisioning in WDM networks . . . . . 1883--1894
              Hyang-Won Lee and   
              Eytan Modiano and   
                       Kayi Lee   Diverse routing in networks with
                                  probabilistic failures . . . . . . . . . 1895--1907
               Reuven Cohen and   
                 Guy Grebla and   
                   Liran Katzir   Cross-layer hybrid FEC/ARQ reliable
                                  multicast with adaptive modulation and
                                  coding in broadband wireless networks    1908--1920
                 Jaeok Park and   
         Mihaela Van Der Schaar   Medium access control protocols with
                                  memory . . . . . . . . . . . . . . . . . 1921--1934
                Kaidi Huang and   
               Ken R. Duffy and   
                   David Malone   On the validity of IEEE 802.11 MAC
                                  modeling hypotheses  . . . . . . . . . . 1935--1948
                Joseph Camp and   
                Edward Knightly   Modulation rate adaptation in urban and
                                  vehicular environments: cross-layer
                                  implementation and experimental
                                  evaluation . . . . . . . . . . . . . . . 1949--1962
             Hanan Shpungin and   
                  Michael Segal   Near-optimal multicriteria spanner
                                  constructions in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1963--1976
            Domenico Ficara and   
           Andrea Di Pietro and   
           Stefano Giordano and   
          Gregorio Procissi and   
                  Fabio Vitucci   Enhancing counting bloom filters through
                                  Huffman-coded multilayer structures  . . 1977--1987
            Shrinivasa Kini and   
 Srinivasan Ramasubramanian and   
             Amund Kvalbein and   
          Audun Fosselie Hansen   Fast recovery from dual-link or
                                  single-node failures in IP networks
                                  using tunneling  . . . . . . . . . . . . 1988--1999


IEEE\slash ACM Transactions on Networking
Volume 19, Number 1, February, 2011

               Eitan Altman and   
        Francesco De Pellegrini   Forward correction and fountain codes in
                                  delay-tolerant networks  . . . . . . . . 1--13
          Pierluigi Rolando and   
             Riccardo Sisto and   
                   Fulvio Risso   SPAF: stateless FSA-based packet filters 14--27
                 Zhong Zhou and   
                 Zheng Peng and   
               Jun-Hong Cui and   
                     Zhijie Shi   Efficient multipath communication for
                                  time-critical applications in underwater
                                  acoustic sensor networks . . . . . . . . 28--41
                Yipeng Zhou and   
              Dah-Ming Chiu and   
                 John C. S. Lui   A simple model for chunk-scheduling
                                  strategies in P2P streaming  . . . . . . 42--54
             Hyunseok Chang and   
                Sugih Jamin and   
                    Wenjie Wang   Live streaming with receiver-based
                                  peer-division multiplexing . . . . . . . 55--68
               Reuven Cohen and   
                 Boris Kapchits   Continuous neighbor discovery in
                                  asynchronous sensor networks . . . . . . 69--79
            Matteo Varvello and   
            Stefano Ferrari and   
             Ernst Biersack and   
                Christophe Diot   Exploring second life  . . . . . . . . . 80--91
               Adrian E. Conway   Fast simulation of service availability
                                  in mesh networks with dynamic path
                                  restoration  . . . . . . . . . . . . . . 92--101
                     Dan Li and   
             Chuanxiong Guo and   
                  Haitao Wu and   
                    Kun Tan and   
            Yongguang Zhang and   
                  Songwu Lu and   
                    Jianping Wu   Scalable and cost-effective
                                  interconnection of data-center servers
                                  using dual server ports  . . . . . . . . 102--114
                 Lihua Yuan and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   ProgME: towards programmable network
                                  measurement  . . . . . . . . . . . . . . 115--128
            Gagan Raj Gupta and   
                 Ness B. Shroff   Delay analysis and optimality of
                                  scheduling policies for multihop
                                  wireless networks  . . . . . . . . . . . 129--141
              Andrea Bianco and   
                  David Hay and   
                     Fabio Neri   Crosstalk-preventing scheduling in
                                  single-and two-stage AWG-based cell
                                  switches . . . . . . . . . . . . . . . . 142--155
                  Tianji Li and   
              Douglas Leith and   
                   David Malone   Buffer sizing for 802.11-based networks  156--169
               Berk Canberk and   
            Ian F. Akyildiz and   
                     Sema Oktug   Primary user activity modeling using
                                  first-difference filter clustering and
                                  correlation in cognitive radio networks  170--183
              Patrick Tague and   
             Sidharth Nabar and   
            James A. Ritcey and   
               Radha Poovendran   Jamming-aware traffic allocation for
                                  multiple-path routing using portfolio
                                  selection  . . . . . . . . . . . . . . . 184--194
           Ivan Wang-Hei Ho and   
               Kin K. Leung and   
                  John W. Polak   Stochastic model and connectivity
                                  dynamics for VANETs in signalized road
                                  systems  . . . . . . . . . . . . . . . . 195--208
                      Yi Xu and   
                     Wenye Wang   The limit of information propagation
                                  speed in large-scale multihop wireless
                                  networks . . . . . . . . . . . . . . . . 209--222
                   Ruogu Li and   
            Atilla Eryilmaz and   
                   Lei Ying and   
                 Ness B. Shroff   A unified approach to optimizing
                                  performance in networks serving
                                  heterogeneous flows  . . . . . . . . . . 223--236
            Chad R. Meiners and   
                Alex X. Liu and   
                     Eric Torng   Topological transformation approaches to
                                  TCAM-based packet classification . . . . 237--250
      Ossama Mohamed Younis and   
            Marwan M. Krunz and   
     Srinivasan Ramasubramanian   ROC: resilient online coverage for
                                  surveillance applications  . . . . . . . 251--264
               Yuanzhe Xuan and   
                   Chin-Tau Lea   Network-coding multicast networks with
                                  QoS guarantees . . . . . . . . . . . . . 265--274
      János Tapolcai and   
                     Bin Wu and   
                 Pin-Han Ho and   
            Lajos Rónyai   A novel approach for failure
                                  localization in all-optical mesh
                                  networks . . . . . . . . . . . . . . . . 275--285
            Jerry T. Chiang and   
                    Yih-Chun Hu   Cross-layer jamming detection and
                                  mitigation in wireless broadcast
                                  networks . . . . . . . . . . . . . . . . 286--298
          Mohammad A. Saleh and   
                 Ahmed E. Kamal   Erratum to \em Design and Provisioning
                                  of WDM Networks With Many-to-Many
                                  Traffic Grooming . . . . . . . . . . . . 299--299

IEEE\slash ACM Transactions on Networking
Volume 19, Number 2, April, 2011

                  Peng Wang and   
                Stephan Bohacek   Practical computation of optimal
                                  schedules in multihop wireless networks  305--318
                  Chi Zhang and   
                  Yang Song and   
               Yuguang Fang and   
                  Yanchao Zhang   On the price of security in large-scale
                                  wireless ad hoc networks . . . . . . . . 319--332
    Henri Dubois-Ferri\`ere and   
      Matthias Grossglauser and   
                Martin Vetterli   Valuable detours: least-cost anypath
                                  routing  . . . . . . . . . . . . . . . . 333--346
       Ashvin Lakshmikantha and   
               Carolyn Beck and   
                     R. Srikant   Impact of file arrivals and departures
                                  on buffer sizing in core routers . . . . 347--358
                 Ruhai Wang and   
          Scott C. Burleigh and   
              Paavan Parikh and   
                Che-Jen Lin and   
                         Bo Sun   Licklider transmission protocol
                                  (LTP)-based DTN for cislunar
                                  communications . . . . . . . . . . . . . 359--368
                   Cong Liu and   
                         Jie Wu   Practical routing in a cyclic MobiSpace  369--382
        Christos K. Liaskos and   
         Sophia G. Petridou and   
      Georgios I. Papadimitriou   Towards realizable, low-cost broadcast
                                  systems for dynamic environments . . . . 383--392
                Kyu-Han Kim and   
                   Kang G. Shin   Self-reconfigurable wireless mesh
                                  networks . . . . . . . . . . . . . . . . 393--404
                Bilal Sadiq and   
             Seung Jun Baek and   
             Gustavo De Veciana   Delay-optimal opportunistic scheduling
                                  and approximations: the log rule . . . . 405--418
              Stefano Secci and   
         Jean-Louis Rougier and   
          Achille Pattavina and   
         Fioravante Patrone and   
                    Guido Maier   Peering equilibrium multipath routing: a
                                  game theory framework for Internet
                                  peering settlements  . . . . . . . . . . 419--432
                    Ping Xu and   
                  Xiang-Yang Li   TOFU: semi-truthful online frequency
                                  allocation mechanism for wireless
                                  network  . . . . . . . . . . . . . . . . 433--446
            Matthew Andrews and   
                     Lisa Zhang   Scheduling algorithms for multicarrier
                                  wireless data systems  . . . . . . . . . 447--455
                    Wei Wei and   
                  Bing Wang and   
                Don Towsley and   
                     Jim Kurose   Model-based identification of dominant
                                  congested links  . . . . . . . . . . . . 456--469
         Gaurav S. Kasbekar and   
             Yigal Bejerano and   
                 Saswati Sarkar   Lifetime and coverage guarantees through
                                  distributed coordinate-free sensor
                                  activation . . . . . . . . . . . . . . . 470--483
                Joohwan Kim and   
                Xiaojun Lin and   
                 Ness B. Shroff   Optimal anycast technique for
                                  delay-sensitive energy-constrained
                                  asynchronous sensor networks . . . . . . 484--497
           Michele Flammini and   
Alberto Marchetti-Spaccamela and   
           Gianpiero Monaco and   
           Luca Moscardelli and   
                    Shmuel Zaks   On the complexity of the regenerator
                                  placement problem in optical networks    498--511
              Gautam Thatte and   
              Urbashi Mitra and   
                 John Heidemann   Parametric methods for anomaly detection
                                  in aggregate traffic . . . . . . . . . . 512--525
              Jung-Shian Li and   
            Ching-Fang Yang and   
                 Jian-Hong Chen   Star-block design in two-level
                                  survivable optical networks  . . . . . . 526--539
              Xiaoping Wang and   
                    Jun Luo and   
                 Yunhao Liu and   
                Shanshan Li and   
                     Dezun Dong   Component-based localization in sparse
                                  wireless networks  . . . . . . . . . . . 540--548
                Libin Jiang and   
          Venkat Anantharam and   
                   Jean Walrand   How bad are selfish investments in
                                  network security?  . . . . . . . . . . . 549--560
           Mohamed Elhawary and   
                Zygmunt J. Haas   Energy-efficient protocol for
                                  cooperative networks . . . . . . . . . . 561--574
                    Jian Ni and   
                 R. Srikant and   
                     Xinzhou Wu   Coloring spatial point processes with
                                  applications to peer discovery in large
                                  wireless networks  . . . . . . . . . . . 575--588
               Holger Boche and   
             Siddharth Naik and   
                Martin Schubert   Pareto boundary of utility sets for
                                  multiuser wireless systems . . . . . . . 589--601
                   Jian Qiu and   
             Mohan Gurusamy and   
            Kee Chaing Chua and   
                       Yong Liu   Local restoration with multiple spanning
                                  trees in metro Ethernet networks . . . . 602--614

IEEE\slash ACM Transactions on Networking
Volume 19, Number 3, June, 2011

        Mahesh Balakrishnan and   
               Tudor Marian and   
          Kenneth P. Birman and   
         Hakim Weatherspoon and   
                 Lakshmi Ganesh   Maelstrom: transparent error correction
                                  for communication between data centers   617--629
                Injong Rhee and   
                 Minsu Shin and   
               Seongik Hong and   
               Kyunghan Lee and   
             Seong Joon Kim and   
                     Song Chong   On the Levy-walk nature of human
                                  mobility . . . . . . . . . . . . . . . . 630--643
          Salim El Rouayheb and   
             Alex Sprintson and   
             Costas Georghiades   Robust network codes for unicast
                                  connections: a case study  . . . . . . . 644--656
                Sheng Huang and   
          Charles U. Martel and   
            Biswanath Mukherjee   Survivable multipath provisioning with
                                  differential delay constraint in telecom
                                  mesh networks  . . . . . . . . . . . . . 657--669
                    Nan Hua and   
                     Jun Xu and   
                   Bill Lin and   
                   Haiquan Zhao   BRICK: a novel exact active statistics
                                  counter architecture . . . . . . . . . . 670--682
            Domenico Ficara and   
           Andrea Di Pietro and   
           Stefano Giordano and   
          Gregorio Procissi and   
              Fabio Vitucci and   
                 Gianni Antichi   Differential encoding of DFAs for fast
                                  regular expression matching  . . . . . . 683--694
           Yu-Wei Eric Sung and   
                    Xin Sun and   
              Sanjay G. Rao and   
            Geoffrey G. Xie and   
                 David A. Maltz   Towards systematic design of enterprise
                                  networks . . . . . . . . . . . . . . . . 695--708
            Mathieu Leconte and   
                    Jian Ni and   
                     R. Srikant   Improved bounds on the throughput
                                  efficiency of greedy maximal scheduling
                                  in wireless networks . . . . . . . . . . 709--720
          Balaji Rengarajan and   
             Gustavo De Veciana   Architecture and abstractions for
                                  environment and traffic-aware
                                  system-level coordination of wireless
                                  networks . . . . . . . . . . . . . . . . 721--734
         Kostas M. Katrinis and   
                 Anna Tzanakaki   On the dimensioning of WDM optical
                                  networks with impairment-aware
                                  regeneration . . . . . . . . . . . . . . 735--746
          Xiaolan Joy Zhang and   
                 Sun-Il Kim and   
              Steven S. Lumetta   Opportunity cost analysis for dynamic
                                  wavelength routed mesh networks  . . . . 747--759
               Saumitra Das and   
   Konstantina Papagiannaki and   
             Suman Banerjee and   
                      Y. C. Tay   SWARM: the power of structure in
                                  community wireless mesh networks . . . . 760--773
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Traffic-oblivious routing in the hose
                                  model  . . . . . . . . . . . . . . . . . 774--787
            Pere Barlet-Ros and   
        Gianluca Iannaccone and   
     Josep Sanju\`as-Cuxart and   
       Josep Solé-Pareta   Predictive resource management of
                                  multiple monitoring applications . . . . 788--801
           Richard T. B. Ma and   
              Dah Ming Chiu and   
             John C. S. Lui and   
               Vishal Misra and   
                 Dan Rubenstein   On cooperative settlement between
                                  content, transit, and eyeball Internet
                                  service providers  . . . . . . . . . . . 802--815
                Libin Jiang and   
                   Jean Walrand   Approaching throughput-optimality in
                                  distributed CSMA scheduling algorithms
                                  with collisions  . . . . . . . . . . . . 816--829
             Brice Augustin and   
             Timur Friedman and   
                Renata Teixeira   Measuring multipath routing in the
                                  Internet . . . . . . . . . . . . . . . . 830--840
                   Lei Ying and   
          Sanjay Shakkottai and   
               Aneesh Reddy and   
                    Shihuan Liu   On combining shortest-path and
                                  back-pressure routing over multihop
                                  wireless networks  . . . . . . . . . . . 841--854
                 Shuyi Chen and   
          Kaustubh R. Joshi and   
          Matti A. Hiltunen and   
     Richard D. Schlichting and   
             William H. Sanders   Using link gradients to predict the
                                  impact of network latency on multitier
                                  applications . . . . . . . . . . . . . . 855--868
               Sameh Sorour and   
                Shahrokh Valaee   An adaptive network coded retransmission
                                  scheme for single-hop wireless multicast
                                  broadcast services . . . . . . . . . . . 869--878
             Sushant Sharma and   
                     Yi Shi and   
              Y. Thomas Hou and   
                Sastry Kompella   An optimal algorithm for relay node
                                  assignment in cooperative ad hoc
                                  networks . . . . . . . . . . . . . . . . 879--892
               Chi-Kin Chau and   
               Minghua Chen and   
               Soung Chang Liew   Capacity of large-scale CSMA wireless
                                  networks . . . . . . . . . . . . . . . . 893--906
      Péter Babarczi and   
      János Tapolcai and   
                     Pin-Han Ho   Adjacent link failure localization with
                                  monitoring trails in all-optical mesh
                                  networks . . . . . . . . . . . . . . . . 907--920
                   Ming Xia and   
          Massimo Tornatore and   
          Charles U. Martel and   
            Biswanath Mukherjee   Risk-aware provisioning for optical WDM
                                  mesh networks  . . . . . . . . . . . . . 921--931

IEEE\slash ACM Transactions on Networking
Volume 19, Number 4, August, 2011

            Arun Vishwanath and   
            Vijay Sivaraman and   
              George N. Rouskas   Anomalous loss performance for mixed
                                  real-time and TCP traffic in routers
                                  with very small buffers  . . . . . . . . 933--946
              Ren-Shiou Liu and   
                Kai-Wei Fan and   
               Zizhan Zheng and   
                   Prasun Sinha   Perpetual and fair data collection for
                                  environmental energy harvesting sensor
                                  networks . . . . . . . . . . . . . . . . 947--960
               Zhipeng Yang and   
                      Hongyi Wu   FINDERS: a featherlight information
                                  network with delay-endurable RFID
                                  support  . . . . . . . . . . . . . . . . 961--974
       Sherif M. ElRakabawy and   
            Christoph Lindemann   A practical adaptive pacing scheme for
                                  TCP in multihop wireless networks  . . . 975--988
         Satyajeet S. Ahuja and   
 Srinivasan Ramasubramanian and   
                   Marwan Krunz   SRLG failure localization in optical
                                  networks . . . . . . . . . . . . . . . . 989--999
                   Kayi Lee and   
              Eytan Modiano and   
                  Hyang-Won Lee   Cross-layer survivability in WDM-based
                                  networks . . . . . . . . . . . . . . . . 1000--1013
             Jingjing Zhang and   
                  Nirwan Ansari   Scheduling hybrid WDM/TDM passive
                                  optical networks with nonzero laser
                                  tuning time  . . . . . . . . . . . . . . 1014--1027
                 June Hwang and   
                 Seong-Lyun Kim   Cross-layer optimization and network
                                  coding in CSMA/CA-based wireless
                                  multihop networks  . . . . . . . . . . . 1028--1042
             Almut Burchard and   
        Jörg Liebeherr and   
                   Florin Ciucu   On superlinear scaling of network delays 1043--1056
                Shihuan Liu and   
                   Lei Ying and   
                     R. Srikant   Throughput-optimal opportunistic
                                  scheduling in the presence of flow-level
                                  dynamics . . . . . . . . . . . . . . . . 1057--1070
             Ahmed E. Kamal and   
         Aditya Ramamoorthy and   
                  Long Long and   
                    Shizheng Li   Overlay protection against link failures
                                  using network coding . . . . . . . . . . 1071--1084
             Luca Cittadini and   
       Giuseppe Di Battista and   
          Massimo Rimondini and   
             Stefano Vissicchio   Wheel $+$ ring $=$ reel: the impact of
                                  route filtering on the stability of
                                  policy routing . . . . . . . . . . . . . 1085--1096
                 Saqib Raza and   
                 Yuanbo Zhu and   
                 Chen-Nee Chuah   Graceful network state migrations  . . . 1097--1110
               Chi-Kin Chau and   
                 Prithwish Basu   Analysis of latency of stateless
                                  opportunistic forwarding in
                                  intermittently connected networks  . . . 1111--1124
 Juan José Jaramillo and   
                     R. Srikant   Optimal scheduling for fair resource
                                  allocation in ad hoc networks with
                                  elastic and inelastic traffic  . . . . . 1125--1136
            Rahul Urgaonkar and   
               Michael J. Neely   Network capacity region and minimum
                                  energy function for a delay-tolerant
                                  mobile ad hoc network  . . . . . . . . . 1137--1150
        Riccardo Giacomelli and   
        Radha Krishna Ganti and   
                 Martin Haenggi   Outage probability of general ad hoc
                                  networks in the high-reliability regime  1151--1163
            Shao-Cheng Wang and   
                    Ahmed Helmy   BEWARE: background traffic-aware rate
                                  adaptation for IEEE 802.11 . . . . . . . 1164--1177
                  Adel Aziz and   
          David Starobinski and   
                 Patrick Thiran   Understanding and tackling the root
                                  causes of instability in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 1178--1193
                   Tian Lan and   
                Xiaojun Lin and   
                Mung Chiang and   
                    Ruby B. Lee   Stability and benefits of suboptimal
                                  utility maximization . . . . . . . . . . 1194--1207
   Konstantinos Pelechrinis and   
           Ioannis Broustis and   
  Srikanth V. Krishnamurthy and   
            Christos Gkantsidis   A measurement-driven anti-jamming system
                                  for 802.11 networks  . . . . . . . . . . 1208--1222
                M. Kodialam and   
             T. V. Lakshman and   
             James B. Orlin and   
               Sudipta Sengupta   End-to-end restorable oblivious routing
                                  of hose model traffic  . . . . . . . . . 1223--1236
                 Minsik Lee and   
               Youngjip Kim and   
                  Chong-Ho Choi   Period-controlled MAC for high
                                  performance in wireless networks . . . . 1237--1250

IEEE\slash ACM Transactions on Networking
Volume 19, Number 5, October, 2011

             MyungKeun Yoon and   
                     Tao Li and   
               Shigang Chen and   
                  Jih-Kwon Peir   Fit a compact spread estimator in small
                                  high-speed memory  . . . . . . . . . . . 1253--1264
               Reuven Cohen and   
        Niloofar Fazlollahi and   
              David Starobinski   Throughput-competitive advance
                                  reservation with bounded path dispersion 1265--1275
              Ketan Rajawat and   
            Nikolaos Gatsis and   
          Georgios B. Giannakis   Cross-layer designs in coded wireless
                                  fading networks with multicast . . . . . 1276--1289
          Christina Aperjis and   
              Ramesh Johari and   
            Michael J. Freedman   Bilateral and multilateral exchanges for
                                  peer-assisted content distribution . . . 1290--1303
            Marwan Batayneh and   
         Dominic A. Schupke and   
             Marco Hoffmann and   
        Andreas Kirstaedter and   
            Biswanath Mukherjee   On routing and transmission-range
                                  determination of multi-bit-rate signals
                                  over mixed-line-rate WDM optical
                                  networks for carrier Ethernet  . . . . . 1304--1316
                   Chuan Wu and   
                 Baochun Li and   
                   Shuqiao Zhao   On dynamic server provisioning in
                                  multichannel P2P live streaming  . . . . 1317--1330
                 Melih Onus and   
         Andréa W. Richa   Minimum maximum-degree publish-subscribe
                                  overlay network design . . . . . . . . . 1331--1343
               Donghyun Kim and   
                   Wei Wang and   
              Nassim Sohaee and   
                Changcun Ma and   
                   Weili Wu and   
                 Wonjun Lee and   
                    Ding-Zhu Du   Minimum data-latency-bound $k$-sink
                                  placement problem in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1344--1353
               Xinbing Wang and   
               Wentao Huang and   
             Shangxing Wang and   
               Jinbei Zhang and   
                     Chenhui Hu   Delay and capacity tradeoff analysis for
                                  motioncast . . . . . . . . . . . . . . . 1354--1367
    Dimitrios Koutsonikolas and   
             Chih-Chun Wang and   
                  Y. Charlie Hu   Efficient network-coding-based
                                  opportunistic routing through cumulative
                                  coded acknowledgments  . . . . . . . . . 1368--1381
                      Bo Li and   
                 Cem Boyaci and   
                         Ye Xia   A refined performance characterization
                                  of longest-queue-first policy in
                                  wireless networks  . . . . . . . . . . . 1382--1395
               Joanne Treurniet   A network activity classification schema
                                  and its application to scan detection    1396--1404
                  Zhenyu Wu and   
                Mengjun Xie and   
                   Haining Wang   Design and implementation of a fast
                                  dynamic packet filter  . . . . . . . . . 1405--1419
            Amogh Dhamdhere and   
           Constantine Dovrolis   Twelve years in the evolution of the
                                  Internet ecosystem . . . . . . . . . . . 1420--1433
     Ovidiu Valentin Drugan and   
           Thomas Plagemann and   
              Ellen Munthe-Kaas   Detecting communities in sparse MANETs   1434--1447
                     Dan Li and   
                Jianping Wu and   
             Jiangchuan Liu and   
                   Yong Cui and   
                          Ke Xu   Defending against distance cheating in
                                  link-weighted application-layer
                                  multicast  . . . . . . . . . . . . . . . 1448--1457
   François Baccelli and   
            Nicholas Bambos and   
                   Nicolas Gast   Distributed delay-power control
                                  algorithms for bandwidth sharing in
                                  wireless networks  . . . . . . . . . . . 1458--1471
                  Ying Jian and   
                 Ming Zhang and   
                   Shigang Chen   Achieving MAC-layer fairness in CSMA/CA
                                  networks . . . . . . . . . . . . . . . . 1472--1484
               Qinglin Zhao and   
          Danny H. K. Tsang and   
                   Taka Sakurai   A simple critical-load-based CAC scheme
                                  for IEEE 802.11 DCF networks . . . . . . 1485--1498
              Marios Lestas and   
        Andreas Pitsillides and   
             Petros Ioannou and   
             George Hadjipollas   A new estimation scheme for the
                                  effective number of users in Internet
                                  congestion control . . . . . . . . . . . 1499--1512
                Sumit Singh and   
        Raghuraman Mudumbai and   
                Upamanyu Madhow   Interference analysis for highly
                                  directional 60-GHz mesh networks: the
                                  case for rethinking medium access
                                  control  . . . . . . . . . . . . . . . . 1513--1527
          Chandramani Singh and   
             Saswati Sarkar and   
                   Alireza Aram   Provider-customer coalitional games  . . 1528--1542
              Kin-Wah Kwong and   
                  Lixin Gao and   
         Roch Guérin and   
                   Zhi-Li Zhang   On the feasibility and efficacy of
                                  protection routing in IP networks  . . . 1543--1556
         Steven Gianvecchio and   
                Mengjun Xie and   
                  Zhenyu Wu and   
                   Haining Wang   Humans and bots in Internet chat:
                                  measurement, analysis, and automated
                                  classification . . . . . . . . . . . . . 1557--1571

IEEE\slash ACM Transactions on Networking
Volume 19, Number 6, December, 2011

   J. J. Garcia-Luna-Aceves and   
        Rolando Menchaca-Mendez   PRIME: an interest-driven approach to
                                  integrated unicast and multicast routing
                                  in MANETs  . . . . . . . . . . . . . . . 1573--1586
Frédérique Oggier and   
                   Hanane Fathi   An authentication code against pollution
                                  attacks in network coding  . . . . . . . 1587--1596
                 Loc X. Bui and   
                 R. Srikant and   
              Alexander Stolyar   A novel architecture for reduction of
                                  delay and queueing structure complexity
                                  in the back-pressure algorithm . . . . . 1597--1609
         Sebastian Neumayer and   
                Gil Zussman and   
               Reuven Cohen and   
                  Eytan Modiano   Assessing the vulnerability of the fiber
                                  infrastructure to disasters  . . . . . . 1610--1623
       Georgios Smaragdakis and   
         Nikolaos Laoutaris and   
           Vassilis Lekakis and   
             Azer Bestavros and   
              John W. Byers and   
              Mema Roussopoulos   Selfish overlay network creation and
                                  maintenance  . . . . . . . . . . . . . . 1624--1637
           Gianni Giorgetti and   
     Sandeep Kumar S. Gupta and   
               Gianfranco Manes   Understanding the limits of RF-based
                                  collaborative localization . . . . . . . 1638--1651
               Sanaz Barghi and   
           Hamid Jafarkhani and   
         Homayoun Yousefi'zadeh   MIMO-assisted MPR-aware MAC design for
                                  asynchronous WLANs . . . . . . . . . . . 1652--1665
          Andrew J. Kalafut and   
              Craig A. Shue and   
                   Minaxi Gupta   Touring DNS open houses for trends and
                                  configurations . . . . . . . . . . . . . 1666--1675
         Dragana Damjanovic and   
                  Michael Welzl   An extension of the TCP steady-state
                                  throughput equation for parallel flows
                                  and its application in MulTFRC . . . . . 1676--1689
          Balaji Rengarajan and   
             Gustavo De Veciana   Practical adaptive user association
                                  policies for wireless systems with
                                  dynamic interference . . . . . . . . . . 1690--1703
                 Chao Liang and   
                  Miao Zhao and   
                       Yong Liu   Optimal bandwidth sharing in multiswarm
                                  multiparty P2P video-conferencing
                                  systems  . . . . . . . . . . . . . . . . 1704--1716
                   Dahai Xu and   
                Mung Chiang and   
               Jennifer Rexford   Link-state routing with hop-by-hop
                                  forwarding can achieve optimal traffic
                                  engineering  . . . . . . . . . . . . . . 1717--1730
             Amitabha Ghosh and   
    Özlem Durmaz Incel and   
           V. S. Anil Kumar and   
         Bhaskar Krishnamachari   Multichannel scheduling and spanning
                                  trees: throughput-delay tradeoff for
                                  fast data collection in sensor networks  1731--1744
               Delia Ciullo and   
          Valentina Martina and   
            Michele Garetto and   
                Emilio Leonardi   Impact of correlated mobility on
                                  delay-throughput performance in mobile
                                  ad hoc networks  . . . . . . . . . . . . 1745--1758
Konstantinos Christodoulopoulos and   
        Panagiotis Kokkinos and   
     Emmanouel Manos Varvarigos   Indirect and direct multicost algorithms
                                  for online impairment-aware RWA  . . . . 1759--1772
                   Lei Ying and   
                 R. Srikant and   
                Don Towsley and   
                    Shihuan Liu   Cluster-based back-pressure routing
                                  algorithm  . . . . . . . . . . . . . . . 1773--1786
                 Dezun Dong and   
                      Mo Li and   
                 Yunhao Liu and   
              Xiang-Yang Li and   
                   Xiangke Liao   Topological detection on wormholes in
                                  wireless ad hoc and sensor networks  . . 1787--1796
             Sumit Rangwala and   
             Apoorva Jindal and   
              Ki-Young Jang and   
       Konstantinos Psounis and   
                Ramesh Govindan   Neighborhood-centric congestion control
                                  for multihop wireless mesh networks  . . 1797--1810
             Lukasz Budzisz and   
          Rade Stanojevi\'c and   
              Arieh Schlote and   
                 Fred Baker and   
                 Robert Shorten   On the fair coexistence of loss- and
                                  delay-based TCP  . . . . . . . . . . . . 1811--1824
            Murali Kodialam and   
             T. V. Lakshman and   
            Sarit Mukherjee and   
                     Limin Wang   Online scheduling of targeted
                                  advertisements for IPTV  . . . . . . . . 1825--1834
                   Kayi Lee and   
              Hyang-Won Lee and   
                  Eytan Modiano   Reliability in layered networks with
                                  random link failures . . . . . . . . . . 1835--1848
                  Meng Wang and   
               Chee Wei Tan and   
                   Weiyu Xu and   
                        Ao Tang   Cost of not splitting in routing:
                                  characterization and estimation  . . . . 1849--1859
                    Pu Wang and   
                Ian F. Akyildiz   Spatial correlation and mobility-aware
                                  traffic modeling for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1860--1873


IEEE\slash ACM Transactions on Networking
Volume 20, Number 1, February, 2012

           Neal Charbonneau and   
             Vinod M. Vokkarane   Static routing and wavelength assignment
                                  for multicast advance reservation in
                                  all-optical wavelength-routed WDM
                                  networks . . . . . . . . . . . . . . . . 1--14
             Hanan Shpungin and   
                    Zongpeng Li   Throughput and energy efficiency in
                                  wireless ad hoc networks with Gaussian
                                  channels . . . . . . . . . . . . . . . . 15--28
                Binbin Chen and   
                Ziling Zhou and   
                  Yuda Zhao and   
                     Haifeng Yu   Efficient error estimating coding:
                                  feasibility and applications . . . . . . 29--44
                 Saqib Raza and   
              Guanyao Huang and   
             Chen-Nee Chuah and   
          Srini Seetharaman and   
             Jatinder Pal Singh   MeasuRouting: a framework for routing
                                  assisted traffic monitoring  . . . . . . 45--56
                 Peilong Li and   
              Honghai Zhang and   
                Baohua Zhao and   
             Sampath Rangarajan   Scalable video multicast with adaptive
                                  modulation and coding in broadband
                                  wireless data systems  . . . . . . . . . 57--68
          Chandramani Singh and   
             Saswati Sarkar and   
               Alireza Aram and   
                   Anurag Kumar   Cooperative profit sharing in
                                  coalition-based resource allocation in
                                  wireless networks  . . . . . . . . . . . 69--83
                   Kai Chen and   
             Chuanxiong Guo and   
                  Haitao Wu and   
                  Jing Yuan and   
              Zhenqian Feng and   
                   Yan Chen and   
                  Songwu Lu and   
                      Wenfei Wu   DAC: generic and automatic address
                                  configuration for data center networks   84--99
             Arun Sridharan and   
             C. Emre Koksal and   
           Elif Uysal-Biyikoglu   A greedy link scheduler for wireless
                                  networks with Gaussian multiple-access
                                  and broadcast channels . . . . . . . . . 100--113
            Ferhat Dikbiyik and   
       Laxman Sahasrabuddhe and   
          Massimo Tornatore and   
            Biswanath Mukherjee   Exploiting excess capacity to improve
                                  robustness of WDM mesh networks  . . . . 114--124
                  Minlan Yu and   
             Marina Thottan and   
                          Li Li   Latency equalization as a new network
                                  service primitive  . . . . . . . . . . . 125--138
               Myungjin Lee and   
              Nick Duffield and   
            Ramana Rao Kompella   Opportunistic flow-level latency
                                  estimation using consistent netflow  . . 139--152
                Sangman Cho and   
         Theodore Elhourani and   
     Srinivasan Ramasubramanian   Independent directed acyclic graphs for
                                  resilient multipath routing  . . . . . . 153--162
                Berk Birand and   
           Maria Chudnovsky and   
               Bernard Ries and   
               Paul Seymour and   
                Gil Zussman and   
                     Yori Zwols   Analyzing the performance of greedy
                                  maximal scheduling via local pooling and
                                  graph theory . . . . . . . . . . . . . . 163--176
               Hongseok Kim and   
         Gustavo De Veciana and   
             Xiangying Yang and   
         Muthaiah Venkatachalam   Distributed $ \alpha $-optimal user
                                  association and cell load balancing in
                                  wireless networks  . . . . . . . . . . . 177--190
        Giuseppe Campobello and   
        Alessandro Leonardi and   
                 Sergio Palazzo   Improving energy saving and reliability
                                  in wireless sensor networks using a
                                  simple CRT-based packet-forwarding
                                  solution . . . . . . . . . . . . . . . . 191--205
         Mosharaf Chowdhury and   
     Muntasir Raihan Rahman and   
                  Raouf Boutaba   ViNEYard: virtual network embedding
                                  algorithms with coordinated node and
                                  link mapping . . . . . . . . . . . . . . 206--219
              Craig A. Shue and   
          Andrew J. Kalafut and   
                   Minaxi Gupta   Abnormally malicious autonomous systems
                                  and their Internet connectivity  . . . . 220--230
              Julien Ridoux and   
              Darryl Veitch and   
              Timothy Broomhead   The case for feed-forward clock
                                  synchronization  . . . . . . . . . . . . 231--242
        Abhijeet A. Bhorkar and   
         Mohammad Naghshvar and   
                Tara Javidi and   
                 Bhaskar D. Rao   Adaptive opportunistic routing for
                                  wireless ad hoc networks . . . . . . . . 243--256
                 Hayang Kim and   
                  Xiaoli Ma and   
      Benjamin Russell Hamilton   Tracking low-precision clocks with
                                  time-varying drifts using Kalman
                                  filtering  . . . . . . . . . . . . . . . 257--270
                   Yihua He and   
         Michalis Faloutsos and   
  Srikanth V. Krishnamurthy and   
                  Marek Chrobak   Obtaining provably legitimate Internet
                                  topologies . . . . . . . . . . . . . . . 271--284
            Matthew Andrews and   
Antonio Fernández Anta and   
                 Lisa Zhang and   
                     Wenbo Zhao   Routing for power minimization in the
                                  speed scaling model  . . . . . . . . . . 285--294
                   Fang Hao and   
            Murali Kodialam and   
             T. V. Lakshman and   
                     Haoyu Song   Fast dynamic multiple-set membership
                                  testing using combinatorial Bloom
                                  filters  . . . . . . . . . . . . . . . . 295--304
                 Yunbo Wang and   
            Mehmet C. Vuran and   
                  Steve Goddard   Cross-layer analysis of the end-to-end
                                  delay distribution in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 305--318

IEEE\slash ACM Transactions on Networking
Volume 20, Number 2, April, 2012

                    Wei Wei and   
             Sharad Jaiswal and   
                 Jim Kurose and   
                Don Towsley and   
              Kyoungwon Suh and   
                      Bing Wang   Identifying 802.11 traffic from passive
                                  measurements using iterative Bayesian
                                  inference  . . . . . . . . . . . . . . . 325--338
                 Sungho Yun and   
          Constantine Caramanis   System-level optimization in wireless
                                  networks: managing interference and
                                  uncertainty via robust optimization  . . 339--352
           Justin Manweiler and   
          Naveen Santhapuri and   
                 Souvik Sen and   
        Romit Roy Choudhury and   
         Srihari Nelakuditi and   
                Kamesh Munagala   Order matters: transmission reordering
                                  in wireless networks . . . . . . . . . . 353--366
           Bridge Qiao Zhao and   
             John C. S. Lui and   
                  Dah-Ming Chiu   A mathematical framework for analyzing
                                  adaptive incentive protocols in P2P
                                  networks . . . . . . . . . . . . . . . . 367--380
                Fabio Soldo and   
          Katerina Argyraki and   
             Athina Markopoulou   Optimal source-based filtering of
                                  malicious traffic  . . . . . . . . . . . 381--395
      Mukundan Venkataraman and   
              Mainak Chatterjee   Quantifying video-QoE degradations of
                                  Internet links . . . . . . . . . . . . . 396--407
               Guoqiang Mao and   
           Brian D. O. Anderson   Towards a better understanding of
                                  large-scale network models . . . . . . . 408--421
              Michael Menth and   
                Frank Lehrieder   Performance of PCN-based admission
                                  control under challenging conditions . . 422--435
       Miklós Reiter and   
              Richard Steinberg   Congestion-dependent pricing and forward
                                  contracts for complementary segments of
                                  a communication network  . . . . . . . . 436--449
                    Rui Tan and   
              Guoliang Xing and   
                Benyuan Liu and   
              Jianping Wang and   
                    Xiaohua Jia   Exploiting data fusion to improve the
                                  coverage of wireless sensor networks . . 450--462
          Luca Chiaraviglio and   
               Marco Mellia and   
                     Fabio Neri   Minimizing ISP network energy cost:
                                  formulation and solutions  . . . . . . . 463--476
             Niv Buchbinder and   
          Liane Lewin-Eytan and   
              Ishai Menache and   
                Joseph Naor and   
                     Ariel Orda   Dynamic power allocation under arbitrary
                                  varying channels: an online approach . . 477--487
            Chad R. Meiners and   
                Alex X. Liu and   
                     Eric Torng   Bit weaving: a non-prefix approach to
                                  compressing packet classifiers in TCAMs  488--500
                  Eric Jung and   
                        Xin Liu   Opportunistic spectrum access in
                                  multiple-primary-user environments under
                                  the packet collision constraint  . . . . 501--514
               Kyunghan Lee and   
               Seongik Hong and   
             Seong Joon Kim and   
                Injong Rhee and   
                     Song Chong   SLAW: self-similar least-action human
                                  walk . . . . . . . . . . . . . . . . . . 515--529
                    Tao Shu and   
                   Marwan Krunz   Finding cheap routes in profit-driven
                                  opportunistic spectrum access networks:
                                  a truthful mechanism design approach . . 530--543
                 Souvik Sen and   
        Romit Roy Choudhury and   
             Srihari Nelakuditi   CSMA/CN: carrier sense multiple access
                                  with collision notification  . . . . . . 544--556
             Beakcheol Jang and   
             Mihail L. Sichitiu   IEEE 802.11 saturation throughput
                                  analysis in the presence of hidden
                                  terminals  . . . . . . . . . . . . . . . 557--570
           Ahmed Elmokashfi and   
             Amund Kvalbein and   
           Constantine Dovrolis   BGP churn evolution: a perspective from
                                  the core . . . . . . . . . . . . . . . . 571--584
               Ermin Kozica and   
             W. Bastiaan Kleijn   A quantization theoretic perspective on
                                  simulcast and layered multicast
                                  optimization . . . . . . . . . . . . . . 585--593
        Costas Courcoubetis and   
                  Richard Weber   Economic issues in shared
                                  infrastructures  . . . . . . . . . . . . 594--608
              Thang N. Dinh and   
                  Ying Xuan and   
                 My T. Thai and   
          Panos M. Pardalos and   
                    Taieb Znati   On new approaches of assessing network
                                  vulnerability: hardness and
                                  approximation  . . . . . . . . . . . . . 609--619
        Giovanna Carofiglio and   
               Luca Muscariello   On the impact of TCP and per-flow
                                  scheduling on Internet performance . . . 620--633

IEEE\slash ACM Transactions on Networking
Volume 20, Number 3, June, 2012

     Khandoker Nadim Parvez and   
           Carey Williamson and   
            Anirban Mahanti and   
                Niklas Carlsson   Insights on media streaming progress
                                  using BitTorrent-like protocols for
                                  on-demand streaming  . . . . . . . . . . 637--650
                   Lili Cao and   
                   Haitao Zheng   Balancing reliability and utilization in
                                  dynamic spectrum access  . . . . . . . . 651--661
            Matthew Roughan and   
                  Yin Zhang and   
           Walter Willinger and   
                       Lili Qiu   Spatio-temporal compressive sensing and
                                  Internet traffic matrices  . . . . . . . 662--676
João Luís Sobrinho and   
                  Tiago Quelhas   A theory for the connectivity discovered
                                  by routing protocols . . . . . . . . . . 677--689
                 XiaoHua Xu and   
              Xiang-Yang Li and   
               Peng-Jun Wan and   
                   ShaoJie Tang   Efficient scheduling for periodic
                                  aggregation queries in multihop sensor
                                  networks . . . . . . . . . . . . . . . . 690--698
             Masanori Bando and   
            N. Sertac Artan and   
               H. Jonathan Chao   Scalable lookahead regular expression
                                  detection system for deep packet
                                  inspection . . . . . . . . . . . . . . . 699--714
             Sanjeev Khanna and   
       Santosh S. Venkatesh and   
              Omid Fatemieh and   
                Fariba Khan and   
                 Carl A. Gunter   Adaptive selective verification: an
                                  efficient adaptive countermeasure to
                                  thwart DoS attacks . . . . . . . . . . . 715--728
                  Fong Pong and   
                Nian-Feng Tzeng   Concise lookup tables for IPv4 and IPv6
                                  longest prefix matching in scalable
                                  routers  . . . . . . . . . . . . . . . . 729--741
              Rafael Laufer and   
    Henri Dubois-Ferri\`ere and   
              Leonard Kleinrock   Polynomial-time algorithms for multirate
                                  anypath routing in wireless multihop
                                  networks . . . . . . . . . . . . . . . . 742--755
           Douglas J. Leith and   
                  Qizhi Cao and   
           Vijay G. Subramanian   Max-min fairness in 802.11 mesh networks 756--769
               Changbin Liu and   
             Ricardo Correa and   
                Xiaozhou Li and   
             Prithwish Basu and   
              Boon Thau Loo and   
                        Yun Mao   Declarative policy-based adaptive mobile
                                  ad hoc networking  . . . . . . . . . . . 770--783
             Edoardo Amaldi and   
             Antonio Capone and   
              Matteo Cesana and   
               Ilario Filippini   Design of wireless sensor networks for
                                  mobile target detection  . . . . . . . . 784--797
               Samir Sebbah and   
               Brigitte Jaumard   Differentiated quality-of-recovery in
                                  survivable optical mesh networks using
                                  $p$-structures . . . . . . . . . . . . . 798--810
        Ramana Rao Kompella and   
           Kirill Levchenko and   
            Alex C. Snoeren and   
                George Varghese   Router support for fine-grained latency
                                  measurements . . . . . . . . . . . . . . 811--824
                    Jian Ni and   
                     Bo Tan and   
                     R. Srikant   Q-CSMA: queue-length-based CSMA/CA
                                  algorithms for achieving maximum
                                  throughput and low delay in wireless
                                  networks . . . . . . . . . . . . . . . . 825--836
                   Wei Wang and   
               Kang G. Shin and   
                     Wenbo Wang   Distributed resource allocation based on
                                  queue balancing in multihop cognitive
                                  radio networks . . . . . . . . . . . . . 837--850
                     Yi Zhu and   
                   Jason P. Jue   Reliable collective communications with
                                  weighted SRLGs in optical networks . . . 851--863
                  Guang Tan and   
           Anne-Marie Kermarrec   Greedy geographic routing in large-scale
                                  sensor networks: a minimum network
                                  decomposition approach . . . . . . . . . 864--877
         Siamak Sorooshyari and   
               Chee Wei Tan and   
                    Mung Chiang   Power control for cognitive radio
                                  networks: axioms, algorithms, and
                                  analysis . . . . . . . . . . . . . . . . 878--891
    Parv Venkitasubramaniam and   
                      Lang Tong   A game-theoretic approach to anonymous
                                  networking . . . . . . . . . . . . . . . 892--905
            Abishek Gopalan and   
     Srinivasan Ramasubramanian   On identifying additive link metrics
                                  using linearly independent cycles and
                                  paths  . . . . . . . . . . . . . . . . . 906--916
               Xinbing Wang and   
                   Luoyi Fu and   
                     Chenhui Hu   Multicast performance with hierarchical
                                  cooperation  . . . . . . . . . . . . . . 917--930
             Brian Eriksson and   
           Gautam Dasarathy and   
               Paul Barford and   
                   Robert Nowak   Efficient network tomography for
                                  Internet topology discovery  . . . . . . 931--943
                     Dan Li and   
                 Yuanjie Li and   
                Jianping Wu and   
                     Sen Su and   
                    Jiangwei Yu   ESM: efficient and scalable data center
                                  multicast routing  . . . . . . . . . . . 944--955
               Zizhan Zheng and   
               Prasun Sinha and   
                  Santosh Kumar   Sparse WiFi deployment for vehicular
                                  Internet access with bounded
                                  interconnection gap  . . . . . . . . . . 956--969
          Anat Bremler-Barr and   
                    Yaron Koral   Accelerating multipattern matching on
                                  compressed HTTP traffic  . . . . . . . . 970--983

IEEE\slash ACM Transactions on Networking
Volume 20, Number 4, August, 2012

             Cataldo Basile and   
         Alberto Cappadonia and   
                   Antonio Lioy   Network-level access control policy
                                  analysis and transformation  . . . . . . 985--998
               Diego Passos and   
        Celio V. N. Albuquerque   A joint approach to routing metrics and
                                  rate adaptation in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 999--1009
             Ionut Trestian and   
         Supranamaya Ranjan and   
      Aleksandar Kuzmanovic and   
                  Antonio Nucci   Taming the mobile data deluge with drop
                                  zones  . . . . . . . . . . . . . . . . . 1010--1023
               Vicky Sharma and   
                Koushik Kar and   
         K. K. Ramakrishnan and   
         Shivkumar Kalyanaraman   A transport protocol to exploit
                                  multipath diversity in wireless networks 1024--1039
                   Hao Wang and   
               Haiquan Zhao and   
                   Bill Lin and   
                         Jun Xu   DRAM-based statistics counter array
                                  architecture with performance guarantee  1040--1053
                     Yi Shi and   
                  Y. Thomas Hou   Some fundamental results on base station
                                  movement problem for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1054--1067
              Ashwini Kumar and   
                   Kang G. Shin   DSASync: managing end-to-end connections
                                  in dynamic spectrum access wireless LANs 1068--1081
           Sharanya Eswaran and   
               Archan Misra and   
             Thomas F. La Porta   Control-theoretic utility maximization
                                  in multihop wireless networks under
                                  mission dynamics . . . . . . . . . . . . 1082--1095
        Krishna Jagannathan and   
           Mihalis Markakis and   
              Eytan Modiano and   
             John N. Tsitsiklis   Queue-length asymptotics for generalized
                                  max-weight scheduling in the presence of
                                  heavy-tailed traffic . . . . . . . . . . 1096--1111
                     Bin Li and   
                Atilla Eryilmaz   Exploring the throughput boundaries of
                                  randomized schedulers in wireless
                                  networks . . . . . . . . . . . . . . . . 1112--1124
           Evangelos Bampas and   
            Aris Pagourtzis and   
           George Pierrakos and   
                Katerina Potika   On a noncooperative model for wavelength
                                  assignment in multifiber optical
                                  networks . . . . . . . . . . . . . . . . 1125--1137
                   Jung Ryu and   
                   Lei Ying and   
              Sanjay Shakkottai   Timescale decoupled routing and rate
                                  control in intermittently connected
                                  networks . . . . . . . . . . . . . . . . 1138--1151
           Gabriel Y. Keung and   
                      Bo Li and   
                     Qian Zhang   The intrusion detection in mobile sensor
                                  network  . . . . . . . . . . . . . . . . 1152--1161
             Josep M. Pujol and   
            Vijay Erramilli and   
            Georgos Siganos and   
              Xiaoyuan Yang and   
         Nikolaos Laoutaris and   
          Parminder Chhabra and   
                Pablo Rodriguez   The little engine(s) that could: scaling
                                  online social networks . . . . . . . . . 1162--1175
            Frank Lehrieder and   
     György Dán and   
       Tobias Hoßfeld and   
             Simon Oechsner and   
                Vlad Singeorzan   Caching for BitTorrent-like P2P systems:
                                  a simple fluid model and its
                                  implications . . . . . . . . . . . . . . 1176--1189
               Hongbo Jiang and   
               Arun Iyengar and   
                Erich Nahum and   
         Wolfgang Segmuller and   
           Asser N. Tantawi and   
              Charles P. Wright   Design, implementation, and performance
                                  of a load balancer for SIP server
                                  clusters . . . . . . . . . . . . . . . . 1190--1202
             Apoorva Jindal and   
                    Mingyan Liu   Networked computing in wireless sensor
                                  networks for structural health
                                  monitoring . . . . . . . . . . . . . . . 1203--1216
               Charles Shen and   
                Erich Nahum and   
        Henning Schulzrinne and   
              Charles P. Wright   The impact of TLS on SIP server
                                  performance: measurement and modeling    1217--1230
              Daniel Medina and   
             Felix Hoffmann and   
         Francesco Rossetto and   
        Carl-Herbert Rokitansky   A geographic routing strategy for North
                                  Atlantic in-flight Internet access via
                                  airborne mesh networking . . . . . . . . 1231--1244
                  Zhen Ling and   
                Junzhou Luo and   
                     Wei Yu and   
                  Xinwen Fu and   
                  Dong Xuan and   
                     Weijia Jia   A new cell-counting-based attack against
                                  Tor  . . . . . . . . . . . . . . . . . . 1245--1261
             Masanori Bando and   
                  Yi-Li Lin and   
               H. Jonathan Chao   FlashTrie: beyond 100-Gb/s IP route
                                  lookup using hash-based
                                  prefix-compressed trie . . . . . . . . . 1262--1275
               Cai Hong Kai and   
               Soung Chang Liew   Applications of belief propagation in
                                  CSMA wireless networks . . . . . . . . . 1276--1289
               Guowang Miao and   
                      Ye Li and   
                Ananthram Swami   Channel-aware distributed medium access
                                  control  . . . . . . . . . . . . . . . . 1290--1303
                     Pan Li and   
                   Miao Pan and   
                   Yuguang Fang   Capacity bounds of three-dimensional
                                  wireless ad hoc networks . . . . . . . . 1304--1315
                Long Bao Le and   
              Eytan Modiano and   
                 Ness B. Shroff   Optimal control of wireless networks
                                  with finite buffers  . . . . . . . . . . 1316--1329

IEEE\slash ACM Transactions on Networking
Volume 20, Number 5, October, 2012

                 Ravi Kokku and   
            Rajesh Mahindra and   
              Honghai Zhang and   
             Sampath Rangarajan   NVS: a substrate for virtualizing
                                  wireless resources in cellular networks  1333--1346
          M. H. R. Khouzani and   
             Saswati Sarkar and   
                   Eitan Altman   Maximum damage malware attack in mobile
                                  wireless networks  . . . . . . . . . . . 1347--1360
               Alex Sherman and   
                 Jason Nieh and   
                 Clifford Stein   FairTorrent: a deficit-based distributed
                                  algorithm to ensure fairness in
                                  peer-to-peer systems . . . . . . . . . . 1361--1374
    Dimitrios Koutsonikolas and   
              Y. Charlie Hu and   
                 Chih-Chun Wang   Pacifier: high-throughput, reliable
                                  multicast without ``Crying babies'' in
                                  wireless mesh networks . . . . . . . . . 1375--1388
                   Wei Chen and   
          Khaled B. Letaief and   
                    Zhigang Cao   Buffer-aware network coding for wireless
                                  networks . . . . . . . . . . . . . . . . 1389--1401
                   Yang Qin and   
                 Lie-Liang Yang   Steady-state throughput analysis of
                                  network coding nodes employing
                                  stop-and-wait automatic repeat request   1402--1411
                 Yongkun Li and   
           Bridge Qiao Zhao and   
                 John C. S. Lui   On modeling product advertisement in
                                  large-scale online social networks . . . 1412--1425
                 Danhua Guo and   
       Laxmi Narayan Bhuyan and   
                        Bin Liu   An efficient parallelized L7-filter
                                  design for multicore servers . . . . . . 1426--1439
              Murtaza Zafer and   
             Dakshi Agrawal and   
              Mudhakar Srivatsa   Limitations of generating a secret key
                                  using wireless fading under active
                                  adversary  . . . . . . . . . . . . . . . 1440--1451
                Joseph Camp and   
              Ehsan Aryafar and   
                Edward Knightly   Coupled 802.11 flows in urban channels:
                                  model and experimental evaluation  . . . 1452--1465
                     Yi Gai and   
     Bhaskar Krishnamachari and   
                     Rahul Jain   Combinatorial network optimization with
                                  unknown variables: multi-armed bandits
                                  with linear rewards and individual
                                  observations . . . . . . . . . . . . . . 1466--1478
             Danail Traskov and   
        Michael Heindlmaier and   
       Muriel Médard and   
                   Ralf Koetter   Scheduling for network-coded multicast   1479--1488
                 Haoyu Song and   
            Murali Kodialam and   
                   Fang Hao and   
                 T. V. Lakshman   Efficient trie braiding in scalable
                                  virtual routers  . . . . . . . . . . . . 1489--1500
               Wentao Huang and   
                   Xinbing Wang   Capacity scaling of general cognitive
                                  networks . . . . . . . . . . . . . . . . 1501--1513
           Mhameed Aezladen and   
               Reuven Cohen and   
                      Danny Raz   Efficient location-based
                                  decision-supporting content distribution
                                  to mobile groups . . . . . . . . . . . . 1514--1526
          Mohammad A. Saleh and   
                 Ahmed E. Kamal   Approximation algorithms for
                                  many-to-many traffic grooming in optical
                                  WDM networks . . . . . . . . . . . . . . 1527--1540
                  Cem Tekin and   
                Mingyan Liu and   
          Richard Southwell and   
              Jianwei Huang and   
          Sahand Haji Ali Ahmad   Atomic congestion games on graphs and
                                  their applications in networking . . . . 1541--1552
                    Wei Gao and   
                 Qinghua Li and   
                    Bo Zhao and   
                    Guohong Cao   Social-aware multicast in
                                  disruption-tolerant networks . . . . . . 1553--1566
       Ramon Aparicio-Pardo and   
          Nina Skorin-Kapov and   
         Pablo Pavon-Marino and   
          Belen Garcia-Manrubia   (Non-)reconfigurable virtual topology
                                  design under multihour traffic in
                                  optical networks . . . . . . . . . . . . 1567--1580
             Khoa Tran Phan and   
                 Jaeok Park and   
         Mihaela Van Der Schaar   Near-optimal deviation-proof medium
                                  access control designs in wireless
                                  networks . . . . . . . . . . . . . . . . 1581--1594
              Honghai Zhang and   
               Yuanxi Jiang and   
         Karthik Sundaresan and   
         Sampath Rangarajan and   
                    Baohua Zhao   Wireless multicast scheduling with
                                  switched beamforming antennas  . . . . . 1595--1607
         Shreeshankar Bodas and   
          Sanjay Shakkottai and   
                   Lei Ying and   
                     R. Srikant   Low-complexity scheduling algorithms for
                                  multichannel downlink wireless networks  1608--1621
                     Tao Li and   
               Shigang Chen and   
                     Yibei Ling   Per-flow traffic measurement through
                                  randomized counter sharing . . . . . . . 1622--1634
        Eugenio Magistretti and   
              Omer Gurewitz and   
             Edward W. Knightly   Measurement-driven modeling of
                                  transmission coordination for 802.11
                                  online . . . . . . . . . . . . . . . . . 1635--1648
                   Ruogu Li and   
                Atilla Eryilmaz   Scheduling for end-to-end
                                  deadline-constrained traffic with
                                  reliability requirements in multihop
                                  networks . . . . . . . . . . . . . . . . 1649--1662
              Sandeep Yadav and   
Ashwath Kumar Krishna Reddy and   
      A. L. Narasimha Reddy and   
             Supranamaya Ranjan   Detecting algorithmically generated
                                  domain-flux attacks with DNS traffic
                                  analysis . . . . . . . . . . . . . . . . 1663--1677

IEEE\slash ACM Transactions on Networking
Volume 20, Number 6, December, 2012

               Minghua Chen and   
             Miroslav Ponec and   
           Sudipta Sengupta and   
                     Jin Li and   
                 Philip A. Chou   Utility maximization in peer-to-peer
                                  systems with applications to video
                                  conferencing . . . . . . . . . . . . . . 1681--1694
                     Bo Han and   
                 Lusheng Ji and   
              Seungjoon Lee and   
        Bobby Bhattacharjee and   
               Robert R. Miller   Are all bits equal?: experimental study
                                  of IEEE 802.11 communication bit errors  1695--1706
                   Lu Zhang and   
                    Xueyan Tang   Optimizing client assignment for
                                  enhancing interactivity in distributed
                                  interactive applications . . . . . . . . 1707--1720
           Ihsan Ayyub Qazi and   
       Lachlan L. H. Andrew and   
                    Taieb Znati   Congestion control with multipacket
                                  feedback . . . . . . . . . . . . . . . . 1721--1733
                     He Yan and   
                Lee Breslau and   
                   Zihui Ge and   
                 Dan Massey and   
                    Dan Pei and   
                 Jennifer Yates   G-RCA: a generic root cause analysis
                                  platform for service quality management
                                  in large IP networks . . . . . . . . . . 1734--1747
                Liguang Xie and   
                     Yi Shi and   
              Y. Thomas Hou and   
               Hanif D. Sherali   Making sensor networks immortal: an
                                  energy-renewal approach with wireless
                                  power transfer . . . . . . . . . . . . . 1748--1761
      János Tapolcai and   
                 Pin-Han Ho and   
        Lajos Rónyai and   
                         Bin Wu   Network-wide local unambiguous failure
                                  localization (NWL-UFL) via monitoring
                                  trails . . . . . . . . . . . . . . . . . 1762--1773
                   Fei Chen and   
                    Alex X. Liu   Privacy- and integrity-preserving range
                                  queries in sensor networks . . . . . . . 1774--1787
         Daniela Brauckhoff and   
   Xenofontas Dimitropoulos and   
                Arno Wagner and   
         Kavé Salamatian   Anomaly extraction in backbone networks
                                  using association rules  . . . . . . . . 1788--1799
                  Yong Ding and   
                  Yang Yang and   
                        Li Xiao   Multisource video on-demand streaming in
                                  wireless mesh networks . . . . . . . . . 1800--1813
                 Anduo Wang and   
                  Limin Jia and   
               Wenchao Zhou and   
                 Yiqing Ren and   
              Boon Thau Loo and   
           Jennifer Rexford and   
                Vivek Nigam and   
              Andre Scedrov and   
                Carolyn Talcott   FSR: formal analysis and implementation
                                  toolkit for safe interdomain routing . . 1814--1827
Jérôme François and   
                  Issam Aib and   
                  Raouf Boutaba   FireCol: a collaborative protection
                                  network for the detection of flooding
                                  DDoS attacks . . . . . . . . . . . . . . 1828--1841
           Laurent Vanbever and   
         Stefano Vissicchio and   
            Cristel Pelsser and   
            Pierre Francois and   
            Olivier Bonaventure   Lossless migrations of link-state IGPs   1842--1855
               Eitan Altman and   
               Anurag Kumar and   
          Chandramani Singh and   
              Rajesh Sundaresan   Spatial SINR games of base station
                                  placement and mobile association . . . . 1856--1869
         George B. Mertzios and   
                 Ignasi Sau and   
           Mordechai Shalom and   
                    Shmuel Zaks   Placing regenerators in optical networks
                                  to satisfy multiple sets of requests . . 1870--1879
          Thuy T. T. Nguyen and   
         Grenville Armitage and   
              Philip Branch and   
               Sebastian Zander   Timely and continuous
                                  machine-learning-based classification
                                  for interactive IP traffic . . . . . . . 1880--1894
             Isaac Keslassy and   
               Kirill Kogan and   
           Gabriel Scalosub and   
                  Michael Segal   Providing performance guarantees in
                                  multipass network processors . . . . . . 1895--1909
               Jeff Seibert and   
               Ruben Torres and   
               Marco Mellia and   
         Maurizio M. Munafo and   
       Cristina Nita-Rotaru and   
                     Sanjay Rao   The Internet-wide impact of P2P traffic
                                  localization on ISP profitability  . . . 1910--1923
                Weiyao Xiao and   
             Sachin Agarwal and   
          David Starobinski and   
               Ari Trachtenberg   Reliable rateless wireless broadcasting
                                  with near-zero feedback  . . . . . . . . 1924--1937
        Dominic DiPalantino and   
                  Ramesh Johari   Traffic engineering with semiautonomous
                                  users: a game-theoretic perspective  . . 1938--1949
                 Jiajia Liu and   
             Xiaohong Jiang and   
           Hiroki Nishiyama and   
                       Nei Kato   Generalized two-hop relay for flexible
                                  delay control in MANETs  . . . . . . . . 1950--1963
                  Ziqiu Yun and   
                 Xiaole Bai and   
                  Dong Xuan and   
                 Weijia Jia and   
                       Wei Zhao   Pattern mutation in wireless sensor
                                  deployment . . . . . . . . . . . . . . . 1964--1977
                     Tao Li and   
               Samuel S. Wu and   
               Shigang Chen and   
                Mark C. K. Yang   Generalized energy-efficient algorithms
                                  for the RFID estimation problem  . . . . 1978--1990
         Gaurav S. Kasbekar and   
             Yigal Bejerano and   
                 Saswati Sarkar   Generic coverage verification without
                                  location information using dimension
                                  reduction  . . . . . . . . . . . . . . . 1991--2004
                 Vinod Kone and   
                   Lei Yang and   
                   Xue Yang and   
                Ben Y. Zhao and   
                   Haitao Zheng   The effectiveness of opportunistic
                                  spectrum access: a measurement study . . 2005--2016


IEEE\slash ACM Transactions on Networking
Volume 21, Number 1, February, 2013

         Mukarram Bin Tariq and   
         Kaushik Bhandankar and   
         Vytautas Valancius and   
              Amgad Zeitoun and   
              Nick Feamster and   
                  Mostafa Ammar   Answering: techniques and deployment
                                  experience . . . . . . . . . . . . . . . 1--13
                 Yunyue Lin and   
                       Qishi Wu   Complexity analysis and algorithm design
                                  for advance bandwidth scheduling in
                                  dedicated networks . . . . . . . . . . . 14--27
                Youngmi Jin and   
             George Kesidis and   
                   Ju Wook Jang   Diffusion dynamics of network
                                  technologies with bounded rational
                                  users: aspiration-based learning . . . . 28--40
               Michael J. Neely   Delay-based network utility maximization 41--54
            Sabato Manfredi and   
         Francesco Oliviero and   
            Simon Pietro Romano   A distributed control law for load
                                  balancing in content delivery networks   55--68
        Sudarshan Vasudevan and   
                Micah Adler and   
             Dennis Goeckel and   
                    Don Towsley   Efficient algorithms for neighbor
                                  discovery in wireless networks . . . . . 69--83
                 Fangwen Fu and   
                  Ulas C. Kozat   Stochastic game for wireless network
                                  virtualization . . . . . . . . . . . . . 84--97
                 Haoyu Song and   
             Jonathan S. Turner   ABC: adaptive binary cuttings for
                                  multidimensional packet classification   98--109
                   Juan Liu and   
                   Wei Chen and   
             Ying Jun Zhang and   
                    Zhigang Cao   A utility maximization framework for
                                  fair and efficient multicasting in
                                  multicarrier wireless cellular networks  110--120
                   Ting Zhu and   
                Ziguo Zhong and   
                    Tian He and   
                   Zhi-Li Zhang   Achieving efficient flooding by
                                  utilizing link correlation in wireless
                                  sensor networks  . . . . . . . . . . . . 121--134
                  Yanhua Li and   
                   Zhi-Li Zhang   Random walks and Green's function on
                                  digraphs: a framework for estimating
                                  wireless transmission costs  . . . . . . 135--148
                    Xi Deng and   
              Yuanyuan Yang and   
                   Sangjin Hong   A flexible platform for hardware-aware
                                  network experiments and a case study on
                                  wireless network coding  . . . . . . . . 149--161
                  Miao Wang and   
                  Lisong Xu and   
               Byrav Ramamurthy   Exploring the design space of
                                  multichannel peer-to-peer live video
                                  streaming systems  . . . . . . . . . . . 162--175
             Sung Hyun Chun and   
                  Richard J. La   Secondary spectrum trading:
                                  auction-based framework for spectrum
                                  allocation and profit sharing  . . . . . 176--189
              Maxwell Young and   
                Aniket Kate and   
               Ian Goldberg and   
                 Martin Karsten   Towards practical communication in
                                  Byzantine-resistant DHTs . . . . . . . . 190--203
                    Yong He and   
                    Jie Sun and   
                 Xiaojun Ma and   
    Athanasios V. Vasilakos and   
                 Ruixi Yuan and   
                     Weibo Gong   Semi-random backoff: towards resource
                                  reservation for channel access in
                                  wireless LANs  . . . . . . . . . . . . . 204--217
                Shaolei Ren and   
                 Jaeok Park and   
         Mihaela Van Der Schaar   Entry and spectrum sharing scheme
                                  selection in femtocell communications
                                  markets  . . . . . . . . . . . . . . . . 218--232
                Yipeng Zhou and   
               Tom Z. J. Fu and   
                  Dah Ming Chiu   On replication algorithm in P2P VoD  . . 233--243
  Eleftheria Athanasopoulou and   
                 Loc X. Bui and   
               Tianxiong Ji and   
                 R. Srikant and   
              Alexander Stolyar   Back-pressure-based packet-by-packet
                                  adaptive routing in communication
                                  networks . . . . . . . . . . . . . . . . 244--257
               Urtzi Ayesta and   
           Martin Erausquin and   
        Matthieu Jonckheere and   
              Ina Maria Verloop   Scheduling in a random environment:
                                  stability and asymptotic optimality  . . 258--271
                 Shinuk Woo and   
                   Hwangnam Kim   An empirical interference modeling for
                                  link reliability assessment in wireless
                                  networks . . . . . . . . . . . . . . . . 272--285
          Bozidar Radunovic and   
            Alexandre Proutiere   On downlink capacity of cellular data
                                  networks with WLAN/WPAN relays . . . . . 286--296
     György Dán and   
                Niklas Carlsson   Centralized and distributed protocols
                                  for tracker-based dynamic swarm
                                  management . . . . . . . . . . . . . . . 297--310
               Jizhong Zhao and   
                     Wei Xi and   
                    Yuan He and   
                 Yunhao Liu and   
              Xiang-Yang Li and   
                  Lufeng Mo and   
                     Zheng Yang   Localization of wireless sensor networks
                                  in the wild: pursuit of ranging quality  311--323
             C. Emre Koksal and   
              Ozgur Ercetin and   
                 Yunus Sarikaya   Control of wireless networks with
                                  secrecy  . . . . . . . . . . . . . . . . 324--337

IEEE\slash ACM Transactions on Networking
Volume 21, Number 2, April, 2013

                  Haitao Wu and   
              Zhenqian Feng and   
             Chuanxiong Guo and   
                Yongguang Zhang   ICTCP: incast congestion control for TCP
                                  in data-center networks  . . . . . . . . 345--358
            Beatriz Lorenzo and   
                    Savo Glisic   Context-aware nanoscale modeling of
                                  multicast multihop cellular networks . . 359--372
         Victor M. Preciado and   
                  Ali Jadbabaie   Moment-based spectral analysis of
                                  large-scale networks using local
                                  structural information . . . . . . . . . 373--382
                   Ken Keys and   
                 Young Hyun and   
             Matthew Luckie and   
                     Kim Claffy   Internet-scale IPv4 alias resolution
                                  with MIDAR . . . . . . . . . . . . . . . 383--399
                  Wei Cheng and   
                  Nan Zhang and   
              Xiuzhen Cheng and   
                   Min Song and   
                   Dechang Chen   Time-bounded essential localization for
                                  wireless sensor networks . . . . . . . . 400--412
              Ammar Metnani and   
               Brigitte Jaumard   Stability of FIPP $p$-cycles under
                                  dynamic traffic in WDM networks: dynamic
                                  traffic,failure-independent
                                  path-protecting (FIPP) $p$-cycles,path
                                  protection,shared bandwidth
                                  protection,stability of protection
                                  structures . . . . . . . . . . . . . . . 413--425
                Xinyu Zhang and   
                   Kang G. Shin   Cooperative carrier signaling:
                                  harmonizing coexisting WPAN and WLAN
                                  devices  . . . . . . . . . . . . . . . . 426--439
               Xinbing Wang and   
                Xiaojun Lin and   
                Qingsi Wang and   
                    Wentao Luan   Mobility increases the connectivity of
                                  wireless networks  . . . . . . . . . . . 440--454
                  Ece Gelal and   
               Jianxia Ning and   
   Konstantinos Pelechrinis and   
                Tae-Suk Kim and   
           Ioannis Broustis and   
  Srikanth V. Krishnamurthy and   
                 Bhaskar D. Rao   Topology control for effective
                                  interference cancellation in multiuser
                                  MIMO networks  . . . . . . . . . . . . . 455--468
         Nikolaos M. Freris and   
             Cheng-Hsin Hsu and   
         Jatinder Pal Singh and   
                   Xiaoqing Zhu   Distortion-aware scalable video
                                  streaming to multinetwork clients  . . . 469--481
               Eitan Altman and   
          Amar Prakash Azad and   
                Tamer Basar and   
        Francesco De Pellegrini   Combined optimal control of activation
                                  and transmission in delay-tolerant
                                  networks . . . . . . . . . . . . . . . . 482--494
               Po-Kai Huang and   
                Xiaojun Lin and   
                 Chih-Chun Wang   A low-complexity congestion control and
                                  scheduling algorithm for multihop
                                  wireless networks with order-optimal
                                  per-flow delay . . . . . . . . . . . . . 495--508
           Brad W. Zarikoff and   
               Douglas J. Leith   Measuring pulsed interference in 802.11
                                  links  . . . . . . . . . . . . . . . . . 509--521
                   Lei Yang and   
               Hongseok Kim and   
              Junshan Zhang and   
                Mung Chiang and   
                   Chee Wei Tan   Pricing-based decentralized spectrum
                                  access control in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 522--535
               Kyunghan Lee and   
                Joohyun Lee and   
                    Yung Yi and   
                Injong Rhee and   
                     Song Chong   Mobile data offloading: how much can
                                  WiFi deliver?  . . . . . . . . . . . . . 536--550
                Alex X. Liu and   
               Amir R. Khakpour   Quantifying and verifying reachability
                                  for access controlled networks . . . . . 551--565
                     Bo Tan and   
       Laurent Massoulié   Optimal content placement for
                                  peer-to-peer video-on-demand systems . . 566--579
         Daniel S. Menasche and   
      Antonio A. De A.Rocha and   
                     Bin Li and   
                Don Towsley and   
             Arun Venkataramani   Content availability and bundling in
                                  swarming systems . . . . . . . . . . . . 580--593
                Eric Rozner and   
               Mi Kyung Han and   
                   Lili Qiu and   
                      Yin Zhang   Model-driven optimization of
                                  opportunistic routing  . . . . . . . . . 594--609
            Andrea Clementi and   
         Francesco Pasquale and   
             Riccardo Silvestri   Opportunistic MANETs: mobility can make
                                  up for low transmission power  . . . . . 610--620
                Qianhong Wu and   
                     Bo Qin and   
                  Lei Zhang and   
       Josep Domingo-Ferrer and   
  Jesús A. Manjón   Fast transmission to remote cooperative
                                  groups: a new key management paradigm    621--633
                      Bo Ji and   
               Changhee Joo and   
                 Ness B. Shroff   Throughput-optimal scheduling in
                                  multihop wireless networks without
                                  per-flow information . . . . . . . . . . 634--647
               Malati Hegde and   
                Pavan Kumar and   
              K. R. Vasudev and   
               N. N. Sowmya and   
             S. V. R. Anand and   
               Anurag Kumar and   
                       Joy Kuri   Experiences with a centralized
                                  scheduling approach for performance
                                  management of IEEE 802.11 wireless LANs  648--662
               Simon S. Lam and   
                      Chen Qian   Geographic routing in $d$-dimensional
                                  spaces with guaranteed delivery and low
                                  stretch  . . . . . . . . . . . . . . . . 663--677

IEEE\slash ACM Transactions on Networking
Volume 21, Number 3, June, 2013

                 De Wen Soh and   
               Wee Peng Tay and   
                Tony Q. S. Quek   Randomized information dissemination in
                                  dynamic environments . . . . . . . . . . 681--691
        Ioannis Pefkianakis and   
                Suk-Bok Lee and   
                      Songwu Lu   Towards MIMO-aware 802.11n rate
                                  adaptation . . . . . . . . . . . . . . . 692--705
               Chee Wei Tan and   
                Mung Chiang and   
                     R. Srikant   Fast algorithms and performance bounds
                                  for sum rate maximization in wireless
                                  networks . . . . . . . . . . . . . . . . 706--719
             Chris Y. T. Ma and   
            David K. Y. Yau and   
              Nung Kwan Yip and   
            Nageswara S. V. Rao   Privacy vulnerability of published
                                  anonymous mobility traces  . . . . . . . 720--733
             Hung X. Nguyen and   
                Matthew Roughan   Rigorous statistical analysis of
                                  Internet loss measurements . . . . . . . 734--745
                 Dajun Qian and   
                 Dong Zheng and   
              Junshan Zhang and   
             Ness B. Shroff and   
                   Changhee Joo   Distributed CSMA algorithms for link
                                  scheduling in multihop MIMO networks
                                  under SINR model . . . . . . . . . . . . 746--759
        Andréa Richa and   
       Christian Scheideler and   
              Stefan Schmid and   
                      Jin Zhang   An efficient and fair MAC protocol
                                  robust to reactive interference  . . . . 760--771
                    Ji Fang and   
                    Kun Tan and   
             Yuanyang Zhang and   
              Shouyuan Chen and   
                  Lixin Shi and   
             Jiansong Zhang and   
            Yongguang Zhang and   
                    Zhenhui Tan   Fine-grained channel access in wireless
                                  LAN  . . . . . . . . . . . . . . . . . . 772--787
             Felipe Lalanne and   
                  Stephane Maag   A formal data-centric approach for
                                  passive testing of communication
                                  protocols  . . . . . . . . . . . . . . . 788--801
             Fabio Checconi and   
                Luigi Rizzo and   
                  Paolo Valente   QFQ: efficient packet scheduling with
                                  tight guarantees . . . . . . . . . . . . 802--816
                     Tao Li and   
               Shigang Chen and   
                    Wen Luo and   
                 Ming Zhang and   
                       Yan Qiao   Spreader classification based on optimal
                                  dynamic bit sharing  . . . . . . . . . . 817--830
               Longbo Huang and   
              Scott Moeller and   
           Michael J. Neely and   
         Bhaskar Krishnamachari   LIFO-backpressure achieves near-optimal
                                  utility-delay tradeoff . . . . . . . . . 831--844
   Natalia Castro Fernandes and   
Marcelo Duffles Donato Moreira and   
Otto Carlos Muniz Bandeira Duarte   An efficient and robust addressing
                                  protocol for node autoconfiguration in
                                  ad hoc networks  . . . . . . . . . . . . 845--856
                   Fei Chen and   
      Bezawada Bruhadeshwar and   
                    Alex X. Liu   Cross-domain privacy-preserving
                                  cooperative firewall optimization  . . . 857--868
         Sriram N. Premnath and   
               Daryl Wasden and   
            Sneha K. Kasera and   
               Neal Patwari and   
      Behrouz Farhang-Boroujeny   Beyond OFDM: best-effort dynamic
                                  spectrum access using filterbank
                                  multicarrier . . . . . . . . . . . . . . 869--882
               Manuel Fogue and   
             Piedad Garrido and   
      Francisco J. Martinez and   
           Juan-Carlos Cano and   
         Carlos T. Calafate and   
                 Pietro Manzoni   An adaptive system based on roadmap
                                  profiling to enhance warning message
                                  dissemination in VANETs  . . . . . . . . 883--895
          Mustafa Y. Arslan and   
   Konstantinos Pelechrinis and   
           Ioannis Broustis and   
           Shailendra Singh and   
  Srikanth V. Krishnamurthy and   
          Sateesh Addepalli and   
       Konstantina Papagiannaki   ACORN: an auto-configuration framework
                                  for 802.11n WLANs  . . . . . . . . . . . 896--909
                    Kai Han and   
                   Yang Liu and   
                        Jun Luo   Duty-cycle-aware minimum-energy
                                  multicasting in wireless sensor networks 910--923
             Yuanqing Zheng and   
                          Mo Li   Fast tag searching protocol for
                                  large-scale RFID systems . . . . . . . . 924--934
               Eitan Altman and   
              Philippe Nain and   
               Adam Shwartz and   
                     Yuedong Xu   Predicting the impact of measures
                                  against P2P networks: transient behavior
                                  and phase transition . . . . . . . . . . 935--949
                Tae-Suk Kim and   
           Ioannis Broustis and   
               Serdar Vural and   
         Dimitris Syrivelis and   
           Shailendra Singh and   
  Srikanth V. Krishnamurthy and   
             Thomas F. La Porta   Realizing the benefits of wireless
                                  network coding in multirate settings . . 950--962
                 Yilin Shen and   
              Nam P. Nguyen and   
                  Ying Xuan and   
                     My T. Thai   On the discovery of critical links and
                                  nodes for assessing network
                                  vulnerability  . . . . . . . . . . . . . 963--973
     Reza Moazzez-Estanjini and   
                  Jing Wang and   
        Ioannis Ch. Paschalidis   Scheduling mobile nodes for cooperative
                                  data transport in sensor networks  . . . 974--989
         Stefano Vissicchio and   
           Laurent Vanbever and   
            Cristel Pelsser and   
             Luca Cittadini and   
            Pierre Francois and   
            Olivier Bonaventure   Improving network agility with seamless
                                  BGP reconfigurations . . . . . . . . . . 990--1002
              Stefano Paris and   
       Cristina Nita-Rotaru and   
            Fabio Martignon and   
                 Antonio Capone   Cross-layer metrics for reliable routing
                                  in wireless mesh networks  . . . . . . . 1003--1016

IEEE\slash ACM Transactions on Networking
Volume 21, Number 4, August, 2013

             Kaidi D. Huang and   
               Ken R. Duffy and   
                   David Malone   H-RCA: 802.11 collision-aware rate
                                  control  . . . . . . . . . . . . . . . . 1021--1034
              Sayandeep Sen and   
                  Tan Zhang and   
                Syed Gilani and   
           Shreesha Srinath and   
             Suman Banerjee and   
              Sateesh Addepalli   Design and implementation of an
                                  ``approximate'' communication system for
                                  wireless media applications  . . . . . . 1035--1048
           Rahul Srivastava and   
                Can Emre Koksal   Basic performance limits and tradeoffs
                                  in energy-harvesting sensor nodes with
                                  finite data and energy storage . . . . . 1049--1062
              Javad Ghaderi and   
                     R. Srikant   The impact of access probabilities on
                                  the delay performance of Q--CSMA
                                  algorithms in wireless networks  . . . . 1063--1075
           Amir R. Khakpour and   
                    Alex X. Liu   An information-theoretical approach to
                                  high-speed flow nature identification    1076--1089
              Xiaoming Wang and   
                Xiaoyong Li and   
                Dmitri Loguinov   Modeling residual-geometric flow
                                  sampling . . . . . . . . . . . . . . . . 1090--1103
             Tsern-Huei Lee and   
                  Nai-Lun Huang   A pattern-matching scheme with high
                                  throughput performance and low memory
                                  requirement  . . . . . . . . . . . . . . 1104--1116
               Longbo Huang and   
               Michael J. Neely   Utility optimal scheduling in
                                  energy-harvesting networks . . . . . . . 1117--1130
               Amin Karbasi and   
                     Sewoong Oh   Robust localization from incomplete
                                  local information  . . . . . . . . . . . 1131--1144
David López-Pérez and   
                 Xiaoli Chu and   
    Athanasios V. Vasilakos and   
                Holger Claussen   On distributed and coordinated resource
                                  allocation for interference mitigation
                                  in self-organizing LTE networks  . . . . 1145--1158
                 Rik Sarkar and   
                        Jie Gao   Differential forms for target tracking
                                  and aggregate queries in distributed
                                  networks . . . . . . . . . . . . . . . . 1159--1172
               Zhangyu Guan and   
            Tommaso Melodia and   
                  Dongfeng Yuan   Jointly optimal rate control and relay
                                  selection for cooperative wireless video
                                  streaming  . . . . . . . . . . . . . . . 1173--1186
                Liang Zhang and   
               Shigang Chen and   
                  Ying Jian and   
               Yuguang Fang and   
                        Zhen Mo   Maximizing lifetime vector in wireless
                                  sensor networks  . . . . . . . . . . . . 1187--1200
            Yeim-Kuan Chang and   
             Cheng-Chien Su and   
             Yung-Chieh Lin and   
                 Sun-Yuan Hsieh   Efficient gray-code-based range encoding
                                  schemes for packet classification in
                                  TCAM . . . . . . . . . . . . . . . . . . 1201--1214
                 Xinzhou Wu and   
          Saurabha Tavildar and   
          Sanjay Shakkottai and   
             Tom Richardson and   
                   Junyi Li and   
               Rajiv Laroia and   
             Aleksandar Jovicic   FlashLinQ: a synchronous distributed
                                  scheduler for peer-to-peer ad hoc
                                  networks . . . . . . . . . . . . . . . . 1215--1228
             Chih-Cheng Hsu and   
             Ming-Shing Kuo and   
              Cheng-Fu Chou and   
              Kate Ching-Ju Lin   The elimination of spatial-temporal
                                  uncertainty in underwater sensor
                                  networks . . . . . . . . . . . . . . . . 1229--1242
             Zhenghao Zhang and   
             Steven Bronson and   
                    Jin Xie and   
                         Wei Hu   Employing the
                                  one-sender-multiple-receiver technique
                                  in wireless LANs . . . . . . . . . . . . 1243--1255
    Subhash Lakshminarayana and   
                Atilla Eryilmaz   Multirate multicasting with intralayer
                                  network coding . . . . . . . . . . . . . 1256--1269
                Shouling Ji and   
                    Zhipeng Cai   Distributed data collection in
                                  large-scale asynchronous wireless sensor
                                  networks under the generalized physical
                                  interference model . . . . . . . . . . . 1270--1283
              Yosuke Himura and   
             Kensuke Fukuda and   
                Kenjiro Cho and   
             Pierre Borgnat and   
               Patrice Abry and   
                  Hiroshi Esaki   Synoptic graphlet: bridging the gap
                                  between supervised and unsupervised
                                  profiling of host-level network traffic  1284--1297
               Ken R. Duffy and   
          Charles Bordenave and   
               Douglas J. Leith   Decentralized constraint satisfaction    1298--1308
Jacques Lévy Véhel and   
                    Michal Rams   Large deviation multifractal analysis of
                                  a class of additive processes with
                                  correlated nonstationary increments  . . 1309--1321
        Ioannis Caragiannis and   
           Michele Flammini and   
               Luca Moscardelli   An exponential improvement on the MST
                                  heuristic for minimum energy
                                  broadcasting in ad hoc wireless networks 1322--1331
            Laura Galluccio and   
           Giacomo Morabito and   
                 Sergio Palazzo   GEographic Multicast (GEM) for dense
                                  wireless networks: protocol design and
                                  performance analysis . . . . . . . . . . 1332--1346

IEEE\slash ACM Transactions on Networking
Volume 21, Number 5, October, 2013

              Ehsan Aryafar and   
        Theodoros Salonidis and   
                 Jingpu Shi and   
                Edward Knightly   Synchronized CSMA contention: model,
                                  implementation, and evaluation . . . . . 1349--1362
                Marco Cello and   
             Giorgio Gnecco and   
             Mario Marchese and   
            Marcello Sanguineti   Optimality conditions for
                                  coordinate-convex policies in CAC with
                                  nonlinear feasibility boundaries . . . . 1363--1377
               Minghong Lin and   
               Adam Wierman and   
       Lachlan L. H. Andrew and   
                   Eno Thereska   Dynamic right-sizing for
                                  power-proportional data centers  . . . . 1378--1391
             Apoorva Jindal and   
           Konstantinos Psounis   On the efficiency of CSMA-CA scheduling
                                  in wireless multihop networks  . . . . . 1392--1406
              Xiaolan Zhang and   
            Giovanni Neglia and   
                 Jim Kurose and   
                Don Towsley and   
                  Haixiang Wang   Benefits of network coding for unicast
                                  application in disruption-tolerant
                                  networks . . . . . . . . . . . . . . . . 1407--1420
        Rubén Cuevas and   
             Michal Kryczka and   
               Angel Cuevas and   
            Sebastian Kaune and   
            Carmen Guerrero and   
                    Reza Rejaie   Unveiling the incentives for content
                                  publishing in popular BitTorrent portals 1421--1435
       Sara Gatmir-Motahari and   
                   Hui Zang and   
                Phyllis Reuther   Time-clustering-based place prediction
                                  for wireless subscribers . . . . . . . . 1436--1446
          Mustafa Y. Arslan and   
               Jongwon Yoon and   
     Karthikeyan Sundaresan and   
  Srikanth V. Krishnamurthy and   
                 Suman Banerjee   A resource management system for
                                  interference mitigation in enterprise
                                  OFDMA femtocells . . . . . . . . . . . . 1447--1460
               Reuven Cohen and   
              Ilia Nudelman and   
                   Gleb Polevoy   On the admission of dependent flows in
                                  powerful sensor networks . . . . . . . . 1461--1471
                Hazem Gomaa and   
        Geoffrey G. Messier and   
           Carey Williamson and   
                  Robert Davies   Estimating instantaneous cache hit ratio
                                  using Markov chain analysis  . . . . . . 1472--1483
           Ilario Filippini and   
                Eylem Ekici and   
                  Matteo Cesana   A new outlook on routing in cognitive
                                  radio networks: minimum-maintenance-cost
                                  routing  . . . . . . . . . . . . . . . . 1484--1498
                   Wei Wang and   
               Donghyun Kim and   
               Min Kyung An and   
                    Wei Gao and   
                 Xianyue Li and   
                 Zhao Zhang and   
                       Weili Wu   On construction of quality
                                  fault-tolerant virtual backbone in
                                  wireless networks  . . . . . . . . . . . 1499--1510
               Yongjun Liao and   
                     Wei Du and   
              Pierre Geurts and   
                      Guy Leduc   DMFSGD: a decentralized matrix
                                  factorization algorithm for network
                                  distance prediction  . . . . . . . . . . 1511--1524
          Pankaj K. Agarwal and   
                 Alon Efrat and   
  Shashidhara K. Ganjugunte and   
                  David Hay and   
   Swaminathan Sankararaman and   
                    Gil Zussman   The resilience of WDM networks to
                                  probabilistic geographical failures  . . 1525--1538
                      Bo Ji and   
               Changhee Joo and   
                 Ness B. Shroff   Delay-based back-pressure scheduling in
                                  multihop wireless networks . . . . . . . 1539--1552
              Albert Banchs and   
     Andres Garcia-Saavedra and   
              Pablo Serrano and   
                   Joerg Widmer   A game-theoretic approach to distributed
                                  opportunistic scheduling . . . . . . . . 1553--1566
               Myungjin Lee and   
              Nick Duffield and   
            Ramana Rao Kompella   High-fidelity per-flow delay
                                  measurements with reference latency
                                  interpolation  . . . . . . . . . . . . . 1567--1580
         Rajasekhar Sappidi and   
        André Girard and   
            Catherine Rosenberg   Maximum achievable throughput in a
                                  wireless sensor network using in-network
                                  computation for statistical functions    1581--1594
              Ehsan Aryafar and   
  Mohammad Ali Khojastepour and   
         Karthik Sundaresan and   
         Sampath Rangarajan and   
                Edward Knightly   ADAM: an adaptive beamforming system for
                                  multicasting in wireless LANs  . . . . . 1595--1608
       Faryad Darabi Sahneh and   
           Caterina Scoglio and   
               Piet Van Mieghem   Generalized epidemic mean-field model
                                  for spreading processes over multilayer
                                  complex networks . . . . . . . . . . . . 1609--1620
               Kyunghan Lee and   
                  Yoora Kim and   
                 Song Chong and   
                Injong Rhee and   
                    Yung Yi and   
                 Ness B. Shroff   On the critical delays of mobile
                                  networks under Lévy walks and Lévy flights 1621--1635
               Tae Hyun Kim and   
                    Jian Ni and   
                 R. Srikant and   
                Nitin H. Vaidya   Throughput-optimal CSMA with imperfect
                                  carrier sensing  . . . . . . . . . . . . 1636--1650
              Ramin Khalili and   
               Nicolas Gast and   
           Miroslav Popovic and   
            Jean-Yves Le Boudec   MPTCP is not Pareto-optimal: performance
                                  issues and a possible solution . . . . . 1651--1665
               Ji-Yong Shin and   
              Emin Gn Sirer and   
         Hakim Weatherspoon and   
                 Darko Kirovski   On the feasibility of completely
                                  wireless datacenters . . . . . . . . . . 1666--1679

IEEE\slash ACM Transactions on Networking
Volume 21, Number 6, December, 2013

           Horia Vlad Balan and   
               Ryan Rogalin and   
     Antonios Michaloliakos and   
       Konstantinos Psounis and   
                 Giuseppe Caire   AirSync: enabling distributed multiuser
                                  MIMO with full spatial multiplexing  . . 1681--1695
                Dongyue Xue and   
                    Eylem Ekici   Delay-guaranteed cross-layer scheduling
                                  in multihop wireless networks  . . . . . 1696--1707
              Mehmet Karaca and   
               Karim Khalil and   
                Eylem Ekici and   
                  Ozgur Ercetin   Optimal scheduling and power allocation
                                  in cooperate-to-join cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1708--1721
                  Liu Xiang and   
                    Jun Luo and   
            Catherine Rosenberg   Compressed data aggregation:
                                  energy-efficient and high-fidelity data
                                  collection . . . . . . . . . . . . . . . 1722--1735
           Piotr H. Srebrny and   
           Thomas Plagemann and   
                Vera Goebel and   
                 Andreas Mauthe   No more Déj\`a Vu: eliminating redundancy
                                  with cachecast: feasibility and
                                  performance gains  . . . . . . . . . . . 1736--1749
            Enzo Baccarelli and   
           Nicola Cordeschi and   
                Valentina Polli   Optimal self-adaptive QoS resource
                                  management in interference-affected
                                  multicast wireless networks  . . . . . . 1750--1759
              Derek Leonard and   
                Dmitri Loguinov   Demystifying Internet-wide service
                                  discovery  . . . . . . . . . . . . . . . 1760--1773
        Osameh M. Al-Kofahi and   
                 Ahmed E. Kamal   Scalable redundancy for sensors-to-sink
                                  communication  . . . . . . . . . . . . . 1774--1784
            Carlee Joe-Wong and   
                 Soumya Sen and   
                   Tian Lan and   
                    Mung Chiang   Multiresource allocation:
                                  fairness-efficiency tradeoffs in a
                                  unifying framework . . . . . . . . . . . 1785--1798
                  Zhijun Li and   
                     Guang Gong   On the node clone detection in wireless
                                  sensor networks  . . . . . . . . . . . . 1799--1811
          Chandramani Singh and   
               Eitan Altman and   
               Anurag Kumar and   
              Rajesh Sundaresan   Optimal forwarding in delay-tolerant
                                  networks with multiple destinations  . . 1812--1826
                Ming Ouyang and   
                       Lei Ying   Approaching throughput optimality with
                                  limited feedback in multichannel
                                  wireless downlink networks . . . . . . . 1827--1838
           Masaki Fukushima and   
             Kohei Sugiyama and   
          Teruyuki Hasegawa and   
              Toru Hasegawa and   
                  Akihiro Nakao   Minimum disclosure routing for network
                                  virtualization and its experimental
                                  evaluation . . . . . . . . . . . . . . . 1839--1851
         Nikolaos Laoutaris and   
       Georgios Smaragdakis and   
            Rade Stanojevic and   
            Pablo Rodriguez and   
                  Ravi Sundaram   Delay-tolerant bulk data transfers on
                                  the Internet . . . . . . . . . . . . . . 1852--1865
           Richard T. B. Ma and   
                   Vishal Misra   The public option: a nonregulatory
                                  alternative to network neutrality  . . . 1866--1879
                   Yin Wang and   
                    Yuan He and   
                  Xufei Mao and   
                 Yunhao Liu and   
                  Xiang-Yang Li   Exploiting constructive interference for
                                  scalable flooding in wireless networks   1880--1889
                 Joan Triay and   
Cristina Cervelló-Pastor and   
             Vinod M. Vokkarane   Analytical blocking probability model
                                  for hybrid immediate and advance
                                  reservations in optical WDM networks . . 1890--1903
                  Huasen Wu and   
                 Chenxi Zhu and   
              Richard J. La and   
                    Xin Liu and   
                 Youguang Zhang   FASA: accelerated S-ALOHA using access
                                  history for event-driven M2M
                                  communications . . . . . . . . . . . . . 1904--1917
       William Wei-Liang Li and   
                  Yuan Shen and   
             Ying Jun Zhang and   
                     Moe Z. Win   Robust power allocation for
                                  energy-efficient location-aware networks 1918--1930
                Tilman Wolf and   
           Sriram Natarajan and   
           Kamlesh T. Vasudevan   High-performance capabilities for
                                  $1$-hop containment of network attacks   1931--1946
                 Dejun Yang and   
               Guoliang Xue and   
                    Xi Fang and   
          Satyajayant Misra and   
                      Jin Zhang   A game-theoretic approach to stable
                                  routing in max-min fair networks . . . . 1947--1959
           M. Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
                       Jia Wang   Large-scale measurement and
                                  characterization of cellular
                                  machine-to-machine traffic . . . . . . . 1960--1973
                     Tao Li and   
               Shigang Chen and   
                     Yibei Ling   Efficient protocols for identifying the
                                  missing tags in a large RFID system  . . 1974--1987
               Guanhong Pei and   
   Srinivasan Parthasarathy and   
         Aravind Srinivasan and   
       Anil Kumar S. Vullikanti   Approximation algorithms for throughput
                                  maximization in wireless networks with
                                  delay constraints  . . . . . . . . . . . 1988--2000
       S. Shunmuga Krishnan and   
            Ramesh K. Sitaraman   Video stream quality impacts viewer
                                  behavior: inferring causality using
                                  quasi-experimental designs . . . . . . . 2001--2014


IEEE\slash ACM Transactions on Networking
Volume 22, Number 1, February, 2014

               Shan-Hung Wu and   
             Ming-Syan Chen and   
                 Chung-Min Chen   Optimally Adaptive Power-Saving
                                  Protocols for Ad Hoc Networks Using the
                                  Hyper Quorum System  . . . . . . . . . . 1--15
                Junbeom Hur and   
                  Kyungtae Kang   Secure Data Retrieval for Decentralized
                                  Disruption-Tolerant Military Networks    16--26
                   Jian Tan and   
                     Swapna and   
                         Shroff   Retransmission Delays With Bounded
                                  Packets: Power-Law Body and Exponential
                                  Tail . . . . . . . . . . . . . . . . . . 27--38
                 Eyal Zohar and   
               Israel Cidon and   
                   Osnat Mokryn   PACK: Prediction-Based Cloud Bandwidth
                                  and Cost Reduction System  . . . . . . . 39--51
                    Yan Cai and   
               Xiaolin Wang and   
                 Weibo Gong and   
                    Don Towsley   A Study on the Performance of a
                                  Three-Stage Load-Balancing Switch  . . . 52--65
               Jinbei Zhang and   
                   Luoyi Fu and   
                   Xinbing Wang   Asymptotic Analysis on Secrecy Capacity
                                  in Large-Scale Wireless Networks . . . . 66--79
           Md. Forkan Uddin and   
        Catherine Rosenberg and   
              Weihua Zhuang and   
             Patrick Mitran and   
                   Andre Girard   Joint Routing and Medium Access Control
                                  in Fixed Random Access Wireless Multihop
                                  Networks . . . . . . . . . . . . . . . . 80--93
            Chad R. Meiners and   
              Jignesh Patel and   
                Eric Norige and   
                Alex X. Liu and   
                     Eric Torng   Fast Regular Expression Matching Using
                                  Small TCAM . . . . . . . . . . . . . . . 94--109
             Raffaele Bolla and   
            Roberto Bruschi and   
         Alessandro Carrega and   
                  Franco Davoli   Green Networking With Packet Processing
                                  Engines: Modeling and Optimization . . . 110--123
                    Wei Ren and   
                  Qing Zhao and   
                Ananthram Swami   Temporal Traffic Dynamics Improve the
                                  Connectivity of Ad Hoc Cognitive Radio
                                  Networks . . . . . . . . . . . . . . . . 124--136
               Supratim Deb and   
       Pantelis Monogioudis and   
              Jerzy Miernik and   
               James P. Seymour   Algorithms for Enhanced Inter-Cell
                                  Interference Coordination (eICIC) in LTE
                                  HetNets  . . . . . . . . . . . . . . . . 137--150
         Srikanth Hariharan and   
                 Ness B. Shroff   On Sample-Path Optimal Dynamic
                                  Scheduling for Sum-Queue Minimization in
                                  Forests  . . . . . . . . . . . . . . . . 151--164
          Marcin Bienkowski and   
              Anja Feldmann and   
          Johannes Grassler and   
          Gregor Schaffrath and   
                  Stefan Schmid   The Wide-Area Virtual Service Migration
                                  Problem: a Competitive Analysis Approach 165--178
                Onur Turkcu and   
             Suresh Subramaniam   Optimal Wavebanding in WDM Ring Networks 179--190
                     Wei Li and   
             Shengling Wang and   
                   Yong Cui and   
              Xiuzhen Cheng and   
                    Ran Xin and   
        Mznah A. Al-Rodhaan and   
            Abdullah Al-Dhelaan   AP Association for Proportional Fairness
                                  in Multirate WLANs . . . . . . . . . . . 191--202
           Leonardo Goratti and   
                 Ece Yaprak and   
            Stefano Savazzi and   
           Carlos Pomalaza-Raez   An Urn Occupancy Approach for Modeling
                                  the Energy Consumption of Distributed
                                  Beaconing  . . . . . . . . . . . . . . . 203--216
            Vinod Ramaswamy and   
               Vinith Reddy and   
        Srinivas Shakkottai and   
             Alex Sprintson and   
               Natarajan Gautam   Multipath Wireless Network Coding: an
                                  Augmented Potential Game Perspective . . 217--229
         Christian Esposito and   
             Marco Platania and   
                Roberto Beraldi   Reliable and Timely Event Notification
                                  for Publish/Subscribe Services Over the
                                  Internet . . . . . . . . . . . . . . . . 230--243
           Nazanin Magharei and   
                Reza Rejaie and   
                Ivica Rimac and   
                Volker Hilt and   
                 Markus Hofmann   ISP-Friendly Live P2P Streaming  . . . . 244--256
        Mihalis G. Markakis and   
              Eytan Modiano and   
             John N. Tsitsiklis   Max-Weight Scheduling in Queueing
                                  Networks With Heavy-Tailed Traffic . . . 257--270
              Eric Anderson and   
             Caleb Phillips and   
             Douglas Sicker and   
                  Dirk Grunwald   Optimization Decomposition for
                                  Scheduling and System Configuration in
                                  Wireless Networks  . . . . . . . . . . . 271--284
               Shurui Huang and   
             Aditya Ramamoorthy   On the Multiple-Unicast Capacity of
                                  $3$-Source, $3$-Terminal Directed
                                  Acyclic Networks . . . . . . . . . . . . 285--299
              Francois Clad and   
            Pascal Merindol and   
       Jean-Jacques Pansiot and   
            Pierre Francois and   
            Olivier Bonaventure   Graceful Convergence in Link-State IP
                                  Networks: a Lightweight Algorithm
                                  Ensuring Minimal Operational Impact  . . 300--312
          Bernardetta Addis and   
             Antonio Capone and   
           Giuliana Carello and   
            Luca G. Gianoli and   
                 Brunilde Sanso   Energy Management Through Optimized
                                  Routing and Device Powering for Greener
                                  Communication Networks . . . . . . . . . 313--325
              Junchen Jiang and   
                 Vyas Sekar and   
                      Hui Zhang   Improving Fairness, Efficiency, and
                                  Stability in HTTP-Based Adaptive Video
                                  Streaming With Festive . . . . . . . . . 326--340

IEEE\slash ACM Transactions on Networking
Volume 22, Number 2, April, 2014

     Andrés Ferragut and   
              Fernando Paganini   Network resource allocation for users
                                  with multiple connections: fairness and
                                  stability  . . . . . . . . . . . . . . . 349--362
              Rafael Laufer and   
        Theodoros Salonidis and   
            Henrik Lundgren and   
              Pascal Le Guyadec   A cross-layer backpressure architecture
                                  for wireless multihop networks . . . . . 363--376
                Faisal Khan and   
            Nicholas Hosein and   
              Soheil Ghiasi and   
             Chen-Nee Chuah and   
                  Puneet Sharma   Streaming solutions for fine-grained
                                  network traffic measurements and
                                  analysis . . . . . . . . . . . . . . . . 377--390
              Nejc Skoberne and   
               Olaf Maennel and   
              Iain Phillips and   
                 Randy Bush and   
                   Jan Zorz and   
                 Mojca Ciglaric   IPv4 address sharing mechanism
                                  classification and tradeoff analysis . . 391--404
                 Amir Nahir and   
                 Ariel Orda and   
                     Ari Freund   Topology design of communication
                                  networks: a game-theoretic perspective   405--414
          Anat Bremler-Barr and   
                  David Hay and   
                    Yaron Koral   CompactDFA: Scalable pattern matching
                                  using longest prefix match solutions . . 415--428
             Mohit Chamania and   
                   Admela Jukan   A comparative analysis of the effects of
                                  dynamic optical circuit provisioning on
                                  IP routing . . . . . . . . . . . . . . . 429--442
                Hyesook Lim and   
                   Nara Lee and   
                Geumdan Jin and   
                Jungwon Lee and   
               Youngju Choi and   
                  Changhoon Yim   Boundary cutting for packet
                                  classification . . . . . . . . . . . . . 443--456
            Vinod Ramaswamy and   
          Diganto Choudhury and   
            Srinivas Shakkottai   Which protocol? Mutual interaction of
                                  heterogeneous congestion controllers . . 457--469
               Guoliang Xue and   
               Ravi Gottapu and   
                    Xi Fang and   
                 Dejun Yang and   
       Krishnaiyan Thulasiraman   A polynomial-time algorithm for
                                  computing disjoint lightpath pairs in
                                  minimum isolated-failure-immune WDM
                                  optical networks . . . . . . . . . . . . 470--483
           Ralf Lübben and   
              Markus Fidler and   
            Jörg Liebeherr   Stochastic bandwidth estimation in
                                  networks with random service . . . . . . 484--497
                   Kai Chen and   
               Ankit Singla and   
                 Atul Singh and   
       Kishore Ramachandran and   
                     Lei Xu and   
              Yueping Zhang and   
                  Xitao Wen and   
                       Yan Chen   OSA: an optical switching architecture
                                  for data center networks with
                                  unprecedented flexibility  . . . . . . . 498--511
           Vojislav Gaji\'c and   
              Jianwei Huang and   
                  Bixio Rimoldi   Competition of wireless providers for
                                  atomic users . . . . . . . . . . . . . . 512--525
              Luca De Cicco and   
                Saverio Mascolo   An adaptive video streaming control
                                  system: modeling, validation, and
                                  performance evaluation . . . . . . . . . 526--539
                  Franck Le and   
João Luís Sobrinho   Interconnecting routing instances  . . . 540--553
                Hongyi Zeng and   
            Peyman Kazemian and   
            George Varghese and   
                   Nick McKeown   Automatic test packet generation . . . . 554--566
                    Feng Li and   
                  Chi Zhang and   
                    Jun Luo and   
               Shi-Qing Xin and   
                        Ying He   LBDP: localized boundary detection and
                                  parametrization for $3$-D sensor
                                  networks . . . . . . . . . . . . . . . . 567--579
          Veeraruna Kavitha and   
               Eitan Altman and   
               R. El-Azouzi and   
              Rajesh Sundaresan   Fair scheduling in cellular systems in
                                  the presence of noncooperative mobiles   580--594
         Elliot Anshelevich and   
             Bugra Caskurlu and   
                Koushik Kar and   
                     Hang Zhang   Capacity allocation games for
                                  network-coded multicast streaming  . . . 595--607
               Qingjun Xiao and   
                   Bin Xiao and   
                     Kai Bu and   
                   Jiannong Cao   Iterative localization of wireless
                                  sensor networks: an accurate and robust
                                  approach . . . . . . . . . . . . . . . . 608--621
                  Yixuan Li and   
                 Qiuyu Peng and   
                   Xinbing Wang   Multicast capacity with max-min fairness
                                  for heterogeneous networks . . . . . . . 622--635
                 Rami Cohen and   
                      Danny Raz   Cost-effective resource allocation of
                                  overlay routing relay nodes  . . . . . . 636--646
            Patrick Loiseau and   
            Galina Schwartz and   
             John Musacchio and   
               Saurabh Amin and   
              S. Shankar Sastry   Incentive mechanisms for Internet
                                  congestion management: fixed-budget
                                  rebate versus time-of-day pricing  . . . 647--661
               Changhee Joo and   
                 Ness B. Shroff   On the delay performance of in-network
                                  aggregation in lossy wireless sensor
                                  networks . . . . . . . . . . . . . . . . 662--673
               Sem C. Borst and   
        Mihalis G. Markakis and   
                    Iraj Saniee   Nonconcave utility maximization in
                                  locally coupled systems, with
                                  applications to wireless and wireline
                                  networks . . . . . . . . . . . . . . . . 674--687

IEEE\slash ACM Transactions on Networking
Volume 22, Number 3, June, 2014

      Mukundan Venkataraman and   
              Mainak Chatterjee   Effects of Internet path selection on
                                  video-QoE: analysis and improvements . . 689--702
                  Shuqin Li and   
                  Jianwei Huang   Price differentiation for communication
                                  networks . . . . . . . . . . . . . . . . 703--716
             Shaoquan Zhang and   
                  Ziyu Shao and   
               Minghua Chen and   
                    Libin Jiang   Optimal distributed P2P streaming under
                                  node degree bounds . . . . . . . . . . . 717--730
              Jeong-Woo Cho and   
                        Yung Yi   On the payoff mechanisms in
                                  peer-assisted services with multiple
                                  content providers: rationality and
                                  fairness . . . . . . . . . . . . . . . . 731--744
          Olga Goussevskaia and   
Magnús M. Halldórsson and   
              Roger Wattenhofer   Algorithms for wireless capacity . . . . 745--755
     Karthikeyan Sundaresan and   
             Sampath Rangarajan   Cooperation versus multiplexing:
                                  multicast scheduling algorithms for
                                  OFDMA relay networks . . . . . . . . . . 756--769
        Hisham M. Almasaeid and   
                 Ahmed E. Kamal   Exploiting multichannel diversity for
                                  cooperative multicast in cognitive radio
                                  mesh networks  . . . . . . . . . . . . . 770--783
    Dulanjalie C. Dhanapala and   
            Anura P. Jayasumana   Topology preserving maps: extracting
                                  layout maps of wireless sensor networks
                                  from virtual coordinates . . . . . . . . 784--797
               Jeff Seibert and   
              Sheila Becker and   
       Cristina Nita-Rotaru and   
                     Radu State   Newton: securing virtual coordinates by
                                  enforcing physical laws  . . . . . . . . 798--811
                    Ning Lu and   
                Tom H. Luan and   
                  Miao Wang and   
                Xuemin Shen and   
                        Fan Bai   Bounds of asymptotic performance limits
                                  of social-proximity vehicular networks   812--825
                    Yang Xu and   
               Chenguang Yu and   
               Jingjiang Li and   
                       Yong Liu   Video telephony for end-consumers:
                                  measurement study of Google+, iChat and
                                  Skype  . . . . . . . . . . . . . . . . . 826--839
    Chaitanya S. K. Vadrevu and   
                   Rui Wang and   
          Massimo Tornatore and   
          Charles U. Martel and   
            Biswanath Mukherjee   Degraded service provisioning in
                                  mixed-line-rate WDM backbone networks
                                  using multipath routing  . . . . . . . . 840--849
            Ahmad R. Dhaini and   
                 Pin-Han Ho and   
             Gangxiang Shen and   
                  Basem Shihada   Energy efficiency in TDMA-based
                                  next-generation passive optical access
                                  networks . . . . . . . . . . . . . . . . 850--863
              Navid Abedini and   
            Srinivas Shakkottai   Content caching and scheduling in
                                  wireless networks with elastic and
                                  inelastic traffic  . . . . . . . . . . . 864--874
      Addisu Tadesse Eshete and   
                   Yuming Jiang   On the transient behavior of CHOKe . . . 875--888
                Yifan Zhang and   
                   Gexin Yu and   
                     Qun Li and   
               Haodong Wang and   
                Xiaojun Zhu and   
                  Baosheng Wang   Channel-hopping-based communication
                                  rendezvous in cognitive radio networks   889--902
                    Hui Lin and   
               Halit Üster   Exact and heuristic algorithms for
                                  data-gathering cluster-based wireless
                                  sensor network design problem  . . . . . 903--916
       Georgios Smaragdakis and   
         Nikolaos Laoutaris and   
     Konstantinos Oikonomou and   
        Ioannis Stavrakakis and   
                 Azer Bestavros   Distributed server migration for
                                  scalable Internet service deployment . . 917--930
                    Kuai Xu and   
                  Feng Wang and   
                         Lin Gu   Behavior analysis of Internet traffic
                                  via bipartite graphs and one-mode
                                  projections  . . . . . . . . . . . . . . 931--942
         Michael Butkiewicz and   
       Harsha V. Madhyastha and   
                     Vyas Sekar   Characterizing Web page complexity and
                                  its impact . . . . . . . . . . . . . . . 943--956
                 Layong Luo and   
                Gaogang Xie and   
                 Yingke Xie and   
              Laurent Mathy and   
         Kavé Salamatian   A hybrid hardware architecture for
                                  high-speed IP lookups and fast route
                                  updates  . . . . . . . . . . . . . . . . 957--969
               Chengchen Hu and   
                    Bin Liu and   
                Hongbo Zhao and   
                   Kai Chen and   
                   Yan Chen and   
                   Yu Cheng and   
                         Hao Wu   Discount counting for fast flow
                                  statistics on flow size and flow volume  970--981
                    Yang Xu and   
                 Zhaobo Liu and   
             Zhuoyuan Zhang and   
               H. Jonathan Chao   High-throughput and memory-efficient
                                  multimatch packet classification based
                                  on distributed and pipelined hash tables 982--995
             Wouter Minnebo and   
                Benny Van Houdt   A fair comparison of pull and push
                                  strategies in large distributed networks 996--1006
            Paul T. Congdon and   
          Prasant Mohapatra and   
            Matthew Farrens and   
               Venkatesh Akella   Simultaneously reducing latency and
                                  power consumption in OpenFlow switches   1007--1020

IEEE\slash ACM Transactions on Networking
Volume 22, Number 4, August, 2014

         Ítalo Cunha and   
            Renata Teixeira and   
              Darryl Veitch and   
                Christophe Diot   DTRACK: a system to predict and track
                                  Internet path changes  . . . . . . . . . 1025--1038
      Andrés Altieri and   
          Leonardo Rey Vega and   
           Pablo Piantanida and   
             Cecilia G. Galarza   Analysis of a cooperative strategy for a
                                  large decentralized wireless network . . 1039--1051
              Hyang-Won Lee and   
                   Kayi Lee and   
                  Eytan Modiano   Maximizing reliability in WDM networks
                                  through lightpath routing  . . . . . . . 1052--1066
      János Tapolcai and   
                 Pin-Han Ho and   
      Péter Babarczi and   
            Lajos Rónyai   On signaling-free failure dependent
                                  restoration in all-optical mesh networks 1067--1078
                    Wen Luo and   
               Shigang Chen and   
                   Yan Qiao and   
                         Tao Li   Missing-tag detection and energy-time
                                  tradeoff in large-scale RFID systems
                                  with unreliable channels . . . . . . . . 1079--1091
          Ori Rottenstreich and   
               Yossi Kanizo and   
                 Isaac Keslassy   The variable-increment counting Bloom
                                  filter . . . . . . . . . . . . . . . . . 1092--1105
               Yishuai Chen and   
              Baoxian Zhang and   
              Changjia Chen and   
                  Dah Ming Chiu   Performance modeling and evaluation of
                                  peer-to-peer live streaming systems
                                  under flash crowds . . . . . . . . . . . 1106--1120
        Hamed Mohsenian-Rad and   
              Jianwei Huang and   
         Vincent W. S. Wong and   
                 Robert Schober   Repeated intersession network coding
                                  games: efficiency and min-max bargaining
                                  solution . . . . . . . . . . . . . . . . 1121--1135
               Myungjin Lee and   
            Sharon Goldberg and   
        Ramana Rao Kompella and   
                George Varghese   FineComb: measuring microscopic latency
                                  and loss in the presence of reordering   1136--1149
               Shizhen Zhao and   
                   Xinbing Wang   Node density and delay in large-scale
                                  wireless networks with unreliable links  1150--1163
                    Hao Yue and   
                  Chi Zhang and   
                   Miao Pan and   
               Yuguang Fang and   
                   Shigang Chen   Unknown-target information collection in
                                  sensor-enabled RFID systems  . . . . . . 1164--1175
              Frank Aurzada and   
     Martin Lévesque and   
               Martin Maier and   
               Martin Reisslein   FiWi access networks based on
                                  next-generation PON and gigabit-class
                                  WLAN technologies: a capacity and delay
                                  analysis . . . . . . . . . . . . . . . . 1176--1189
            Shang-Pin Sheng and   
                    Mingyan Liu   Profit incentive in trading nonexclusive
                                  access on a secondary spectrum market
                                  through contract design  . . . . . . . . 1190--1203
              Jin-Ghoo Choi and   
               Changhee Joo and   
              Junshan Zhang and   
                 Ness B. Shroff   Distributed link scheduling under SINR
                                  model in multihop wireless networks  . . 1204--1217
                  Xin Zhang and   
                 Fanfu Zhou and   
                  Xinyu Zhu and   
                Haiyang Sun and   
              Adrian Perrig and   
    Athanasios V. Vasilakos and   
                   Haibing Guan   DFL: secure and practical fault
                                  localization for datacenter networks . . 1218--1231
            Amir Houmansadr and   
             Negar Kiyavash and   
                 Nikita Borisov   Non-blind watermarking of network flows  1232--1244
                  Shuang Li and   
               Zizhan Zheng and   
                Eylem Ekici and   
                    Ness Shroff   Maximizing system throughput by
                                  cooperative sensing in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1245--1256
                Zvi Rosberg and   
                    Yu Peng and   
                    Jing Fu and   
                    Jun Guo and   
            Eric W. M. Wong and   
                 Moshe Zukerman   Insensitive job assignment with
                                  throughput and energy criteria for
                                  processor-sharing server farms . . . . . 1257--1270
                   Wei Dong and   
           Swati Rallapalli and   
               Rittwik Jana and   
                   Lili Qiu and   
         K. K. Ramakrishnan and   
               Leo Razoumov and   
                  Yin Zhang and   
                    Tae Won Cho   iDEAL: incentivized dynamic cellular
                                  offloading via auctions  . . . . . . . . 1271--1284
                   Jin Teng and   
               Boying Zhang and   
                  Junda Zhu and   
                 Xinfeng Li and   
                  Dong Xuan and   
                  Yuan F. Zheng   EV-Loc: integrating electronic and
                                  visual signals for accurate localization 1285--1296
            Hulya Seferoglu and   
             Athina Markopoulou   Network coding-aware queue management
                                  for TCP flows over coded wireless
                                  networks . . . . . . . . . . . . . . . . 1297--1310
                  Peng Yang and   
                  Juan Shao and   
                    Wen Luo and   
                  Lisong Xu and   
            Jitender Deogun and   
                        Ying Lu   TCP congestion avoidance algorithm
                                  identification . . . . . . . . . . . . . 1311--1324
               Shengbo Chen and   
               Prasun Sinha and   
             Ness B. Shroff and   
                   Changhee Joo   A simple asymptotically optimal joint
                                  energy allocation and routing scheme in
                                  rechargeable sensor networks . . . . . . 1325--1336
                  Yuan Shen and   
                 Wenhan Dai and   
                     Moe Z. Win   Power optimization for network
                                  localization . . . . . . . . . . . . . . 1337--1350
                   Liang Ma and   
                    Ting He and   
               Kin K. Leung and   
            Ananthram Swami and   
                    Don Towsley   Inferring link metrics from end-to-end
                                  path measurements: identifiability and
                                  monitor placement  . . . . . . . . . . . 1351--1368

IEEE\slash ACM Transactions on Networking
Volume 22, Number 5, October, 2014

            Abishek Gopalan and   
     Srinivasan Ramasubramanian   On the maximum number of linearly
                                  independent cycles and paths in a
                                  network  . . . . . . . . . . . . . . . . 1373--1388
                     Bo Han and   
                    Jian Li and   
             Aravind Srinivasan   Your friends have more friends than you
                                  do: identifying influential mobile users
                                  through random-walk sampling . . . . . . 1389--1400
             Chao-Chih Chen and   
                 Lihua Yuan and   
           Albert Greenberg and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   Routing-as-a-service (RaaS): a framework
                                  for tenant-directed route control in
                                  data center  . . . . . . . . . . . . . . 1401--1414
             Ignacio Castro and   
            Rade Stanojevic and   
                Sergey Gorinsky   Using tuangou to reduce IP transit costs 1415--1428
           P. M. Van De Ven and   
  Augustus J. E. M. Janssen and   
       J. S. H. Van Leeuwaarden   Balancing exposed and hidden nodes in
                                  linear wireless networks . . . . . . . . 1429--1443
             Hasti Ahlehagh and   
                      Sujit Dey   Video-aware scheduling and caching in
                                  the radio access network . . . . . . . . 1444--1462
          Markku Antikainen and   
                Tuomas Aura and   
         Mikko Särelä   Denial-of-service attacks in
                                  Bloom-filter-based forwarding  . . . . . 1463--1476
                Shihuan Liu and   
                Eylem Ekici and   
                       Lei Ying   Scheduling in multihop wireless networks
                                  without back-pressure  . . . . . . . . . 1477--1488
                   Jin Xiao and   
                  Raouf Boutaba   Reconciling the overlay and underlay
                                  tussle . . . . . . . . . . . . . . . . . 1489--1502
                     Dan Li and   
                Hongze Zhao and   
                 Mingwei Xu and   
                    Xiaoming Fu   Revisiting the design of mega data
                                  centers: considering heterogeneity among
                                  containers . . . . . . . . . . . . . . . 1503--1515
            Vinod Muthusamy and   
             Hans-Arno Jacobsen   Infrastructure-free content-based
                                  publish/subscribe  . . . . . . . . . . . 1516--1530
               Jongwon Yoon and   
              Honghai Zhang and   
             Suman Banerjee and   
             Sampath Rangarajan   Video multicast with joint resource
                                  allocation and adaptive modulation and
                                  coding in 4G networks  . . . . . . . . . 1531--1544
                  Kang Chen and   
                   Haiying Shen   SMART: utilizing distributed social map
                                  for lightweight routing in
                                  delay-tolerant networks  . . . . . . . . 1545--1558
            Van Minh Nguyen and   
            Chung Shue Chen and   
                 Laurent Thomas   A unified stochastic model of handover
                                  measurement in mobile networks . . . . . 1559--1576
                  Stepan Kucera   Enabling co-channel small-cell
                                  deployments in SINR-constraint networks
                                  by distributed monitoring of normalized
                                  network capacity . . . . . . . . . . . . 1577--1590
             Chris Develder and   
                Jens Buysse and   
                Bart Dhoedt and   
               Brigitte Jaumard   Joint dimensioning of server and network
                                  infrastructure for resilient optical
                                  grids/clouds . . . . . . . . . . . . . . 1591--1606
                     Sen Su and   
             Zhongbao Zhang and   
                Alex X. Liu and   
                Xiang Cheng and   
                 Yiwen Wang and   
                   Xinchao Zhao   Energy-aware virtual network embedding   1607--1620
                 Rahul Vaze and   
                Rachit Garg and   
                 Neetish Pathak   Dynamic power allocation for maximizing
                                  throughput in energy-harvesting
                                  communication system . . . . . . . . . . 1621--1630
                     I-Hong Hou   Scheduling heterogeneous real-time
                                  traffic over fading wireless channels    1631--1644
         Claudio Cicconetti and   
            Luciano Lenzini and   
                Andrea Lodi and   
           Silvano Martello and   
              Enzo Mingozzi and   
                 Michele Monaci   Efficient two-dimensional data
                                  allocation in IEEE 802.16 OFDMA  . . . . 1645--1658
                  Lei Zhang and   
                   Dongning Guo   Virtual full duplex wireless
                                  broadcasting via compressed sensing  . . 1659--1671
                    Hao Han and   
                 Yunxin Liu and   
                Guobin Shen and   
            Yongguang Zhang and   
                     Qun Li and   
                    Chiu C. Tan   Design, realization, and evaluation of
                                  DozyAP for power-efficient Wi-Fi
                                  tethering  . . . . . . . . . . . . . . . 1672--1685
       Soroush Jahromizadeh and   
              Veselin Rakocevic   Joint rate control and scheduling for
                                  providing bounded delay with high
                                  efficiency in multihop wireless networks 1686--1698

IEEE\slash ACM Transactions on Networking
Volume 22, Number 6, December, 2014

              Jignesh Patel and   
                Alex X. Liu and   
                     Eric Torng   Bypassing space explosion in high-speed
                                  regular expression matching  . . . . . . 1701--1714
                     Amy Fu and   
           Parastoo Sadeghi and   
           Muriel Médard   Dynamic rate adaptation for improved
                                  throughput and delay in wireless network
                                  coded broadcast  . . . . . . . . . . . . 1715--1728
       Cristiano Tapparello and   
            Osvaldo Simeone and   
                  Michele Rossi   Dynamic compression-transmission for
                                  energy-harvesting multihop networks with
                                  correlated sources . . . . . . . . . . . 1729--1741
            Masoud Akhoondi and   
                  Curtis Yu and   
           Harsha V. Madhyastha   LASTor: a low-latency AS-aware Tor
                                  client . . . . . . . . . . . . . . . . . 1742--1755
            Sastry Kompella and   
              Gam D. Nguyen and   
                Clement Kam and   
     Jeffrey E. Wieselthier and   
             Anthony Ephremides   Cooperation in cognitive underlay
                                  networks: stable throughput tradeoffs    1756--1768
              Chiara Orsini and   
             Enrico Gregori and   
            Luciano Lenzini and   
                Dmitri Krioukov   Evolution of the Internet $k$-dense
                                  structure  . . . . . . . . . . . . . . . 1769--1780
               Shannon Chen and   
                Cing-Yu Chu and   
                Su-Ling Yeh and   
                Hao-Hua Chu and   
                    Polly Huang   Modeling the QoE of rate changes in
                                  Skype/SILK VoIP calls  . . . . . . . . . 1781--1793
           Kostas Stamatiou and   
                 Martin Haenggi   Delay characterization of multihop
                                  transmission in a Poisson field of
                                  interference . . . . . . . . . . . . . . 1794--1807
            Somayeh Sojoudi and   
              Steven H. Low and   
                  John C. Doyle   Buffering dynamics and stability of
                                  Internet congestion controllers  . . . . 1808--1818
                 I-Hong Hou and   
                   Piyush Gupta   Proportionally fair distributed resource
                                  allocation in multiband wireless systems 1819--1830
          Douglas M. Blough and   
                Paolo Santi and   
               Ramya Srinivasan   On the feasibility of unilateral
                                  interference cancellation in MIMO
                                  networks . . . . . . . . . . . . . . . . 1831--1844
        Eugenio Magistretti and   
              Omer Gurewitz and   
             Edward W. Knightly   802.11ec: collision avoidance without
                                  control messages . . . . . . . . . . . . 1845--1858
                 Sungsu Lim and   
                Kyomin Jung and   
                Matthew Andrews   Stability of the max-weight protocol in
                                  adversarial wireless networks  . . . . . 1859--1872
          Mahmoud Al-Ayyoub and   
                 Himanshu Gupta   Truthful spectrum auctions with
                                  approximate social-welfare or revenue    1873--1885
             Yuanqing Zheng and   
                          Mo Li   Towards more efficient cardinality
                                  estimation for large-scale RFID systems  1886--1896
               Changbin Liu and   
             Ricardo Correa and   
                Harjot Gill and   
               Tanveer Gill and   
                Xiaozhou Li and   
       Shivkumar Muthukumar and   
                Taher Saeed and   
              Boon Thau Loo and   
                 Prithwish Basu   PUMA: policy-based unified multiradio
                                  architecture for agile mesh networking   1897--1910
                      Bo Ji and   
             Gagan R. Gupta and   
                Xiaojun Lin and   
                 Ness B. Shroff   Low-complexity scheduling policies for
                                  achieving throughput and asymptotic
                                  delay optimality in multichannel
                                  wireless networks  . . . . . . . . . . . 1911--1924
                      Qi Li and   
                 Mingwei Xu and   
                  Yuan Yang and   
                  Lixin Gao and   
                   Yong Cui and   
                    Jianping Wu   Safe and practical energy-efficient
                                  detour routing in IP networks  . . . . . 1925--1937
        Siva Theja Maguluri and   
                     R. Srikant   Scheduling jobs with unknown duration in
                                  clouds . . . . . . . . . . . . . . . . . 1938--1951
                   Wei Dong and   
                 Yunhao Liu and   
                    Yuan He and   
                   Tong Zhu and   
                      Chun Chen   Measurement and analysis on the packet
                                  delivery performance in a large-scale
                                  sensor network . . . . . . . . . . . . . 1952--1963
           Alberto Dainotti and   
         Claudio Squarcella and   
                 Emile Aben and   
         Kimberly C. Claffy and   
               Marco Chiesa and   
              Michele Russo and   
         Antonio Pescapé   Analysis of country-wide Internet
                                  outages caused by censorship . . . . . . 1964--1977
                 Hongyi Yao and   
               Danilo Silva and   
             Sidharth Jaggi and   
               Michael Langberg   Network codes resilient to jamming and
                                  eavesdropping  . . . . . . . . . . . . . 1978--1987
                Shaxun Chen and   
                   Kai Zeng and   
              Prasant Mohapatra   Efficient data capturing for network
                                  forensics in cognitive radio networks    1988--2000
              Thang N. Dinh and   
              Huiyuan Zhang and   
            Dzung T. Nguyen and   
                     My T. Thai   Cost-effective viral marketing for
                                  time-critical campaigns in large-scale
                                  social networks  . . . . . . . . . . . . 2001--2011
             Guanfeng Liang and   
                  Ulas C. Kozat   Fast cloud: pushing the envelope on
                                  delay performance of cloud storage with
                                  coding . . . . . . . . . . . . . . . . . 2012--2025
          Maximilian Kriegleder   A correction to algorithm A2 in
                                  ``Asynchronous distributed averaging on
                                  communication networks'' . . . . . . . . 2026--2027


IEEE\slash ACM Transactions on Networking
Volume 23, Number 1, February, 2015

              Wanchun Jiang and   
               Fengyuan Ren and   
                     Chuang Lin   Phase plane analysis of quantized
                                  congestion notification for data center
                                  Ethernet . . . . . . . . . . . . . . . . 1--14
               Hongbo Jiang and   
                Tianlong Yu and   
                  Chen Tian and   
                  Guang Tan and   
                 Chonggang Wang   Connectivity-based segmentation in
                                  large-scale $2$-D/$3$-D sensor networks:
                                  algorithm and applications . . . . . . . 15--27
             Cataldo Basile and   
                   Antonio Lioy   Analysis of application-layer filtering
                                  policies with application to HTTP  . . . 28--41
            Marco Leogrande and   
               Fulvio Risso and   
                Luigi Ciminiera   Modeling complex packet filters with
                                  finite state automata  . . . . . . . . . 42--55
          Alberto Rabbachin and   
               Andrea Conti and   
                     Moe Z. Win   Wireless network intrinsic secrecy . . . 56--69
               Haiying Shen and   
                          Ze Li   A hierarchical account-aided reputation
                                  management system for MANETs . . . . . . 70--84
           Richard T. B. Ma and   
             John C. S. Lui and   
                   Vishal Misra   Evolution of the Internet economic
                                  ecosystem  . . . . . . . . . . . . . . . 85--98
 Güner D. Çelik and   
                  Eytan Modiano   Scheduling in networks with time-varying
                                  channels and reconfiguration delay . . . 99--113
               Reuven Cohen and   
                     Guy Grebla   Joint scheduling and fast cell selection
                                  in OFDMA wireless networks . . . . . . . 114--125
                  Yang Yang and   
                 Ness B. Shroff   Throughput of rateless codes over
                                  broadcast erasure channels . . . . . . . 126--137
               Gabi Nakibly and   
               Reuven Cohen and   
                   Liran Katzir   Optimizing data plane resources for
                                  multipath flows  . . . . . . . . . . . . 138--147
          Alessandro Checco and   
               Douglas J. Leith   Fair virtualization of 802.11 networks   148--160
            Fabio Martignon and   
              Stefano Paris and   
           Ilario Filippini and   
                   Lin Chen and   
                 Antonio Capone   Efficient and truthful bandwidth
                                  allocation in wireless mesh community
                                  networks . . . . . . . . . . . . . . . . 161--174
               Bahar Partov and   
           Douglas J. Leith and   
                 Rouzbeh Razavi   Utility fair optimization of antenna
                                  tilt angles in LTE networks  . . . . . . 175--185
               Jiliang Wang and   
                   Wei Dong and   
                Zhichao Cao and   
                     Yunhao Liu   On the delay performance in a
                                  large-scale wireless sensor network:
                                  measurement, analysis, and implications  186--197
    Fragkiskos Papadopoulos and   
        Constantinos Psomas and   
                Dmitri Krioukov   Network mapping by replaying hyperbolic
                                  growth . . . . . . . . . . . . . . . . . 198--211
                  Kang Chen and   
                   Haiying Shen   DTN-FLOW: inter-landmark data flow for
                                  high-throughput routing in DTNs  . . . . 212--226
         Stefano Vissicchio and   
             Luca Cittadini and   
           Giuseppe Di Battista   On iBGP routing policies . . . . . . . . 227--240
           Muhammad Shahzad and   
                    Alex X. Liu   Fast and accurate estimation of RFID
                                  tags . . . . . . . . . . . . . . . . . . 241--254
             Yuan-Cheng Lai and   
             Ling-Yen Hsiao and   
                   Bor-Shen Lin   Optimal slot assignment for binary
                                  tracking tree protocol in RFID tag
                                  identification . . . . . . . . . . . . . 255--268
          Karumbu Premkumar and   
               Xiaomin Chen and   
               Douglas J. Leith   Proportional fair coding for wireless
                                  mesh networks  . . . . . . . . . . . . . 269--281
        P. Brighten Godfrey and   
             Matthew Caesar and   
                  Ian Haken and   
               Yaron Singer and   
              Scott Shenker and   
                     Ion Stoica   Stabilizing route selection in BGP . . . 282--299
                Xinghua Sun and   
                        Lin Dai   Backoff design for IEEE 802.11 DCF
                                  networks: fundamental tradeoff and
                                  design criterion . . . . . . . . . . . . 300--316
    Didem Gözüpek and   
           Mordechai Shalom and   
              Fatih Alagöz   A graph-theoretic approach to scheduling
                                  in cognitive radio networks  . . . . . . 317--328

IEEE\slash ACM Transactions on Networking
Volume 23, Number 2, April, 2015

           Alberto Dainotti and   
              Alistair King and   
            Kimberly Claffy and   
          Ferdinando Papale and   
         Antonio Pescapé   Analysis of a ``/0'' stealth scan from a
                                  botnet . . . . . . . . . . . . . . . . . 341--354
            Carlee Joe-Wong and   
                 Soumya Sen and   
                     Sangtae Ha   Offering supplementary network
                                  technologies: adoption behavior and
                                  offloading benefits  . . . . . . . . . . 355--368
              Lieven Tytgat and   
                Opher Yaron and   
               Sofie Pollin and   
             Ingrid Moerman and   
                 Piet Demeester   Analysis and experimental verification
                                  of frequency-based interference
                                  avoidance mechanisms in IEEE 802.15.4    369--382
          Mukundan Madhavan and   
           Harish Ganapathy and   
            Malolan Chetlur and   
         Shivkumar Kalyanaraman   Adapting cellular networks to
                                  whitespaces spectrum . . . . . . . . . . 383--397
               Supratim Deb and   
           Pantelis Monogioudis   Learning-based uplink interference
                                  management in $4$G LTE cellular systems  398--411
        George Papageorgiou and   
           Shailendra Singh and   
  Srikanth V. Krishnamurthy and   
            Ramesh Govindan and   
                   Tom La Porta   A distortion-resistant routing framework
                                  for video traffic in wireless multihop
                                  networks . . . . . . . . . . . . . . . . 412--425
               Reuven Cohen and   
                     Guy Grebla   Efficient allocation of periodic
                                  feedback channels in broadband wireless
                                  networks . . . . . . . . . . . . . . . . 426--436
                Liguang Xie and   
                     Yi Shi and   
              Y. Thomas Hou and   
                Wenjing Lou and   
           Hanif D. Sherali and   
               Scott F. Midkiff   Multi-node wireless energy charging in
                                  sensor networks  . . . . . . . . . . . . 437--450
           Chih-Chuan Cheng and   
                  Pi-Cheng Hsiu   Extend your journey: considering signal
                                  strength and fluctuation in
                                  location-based applications  . . . . . . 451--464
                   Yong Cui and   
                  Lian Wang and   
                   Xin Wang and   
                Hongyi Wang and   
                    Yining Wang   FMTCP: a fountain code-based multipath
                                  transmission control protocol  . . . . . 465--478
               Sanaz Barghi and   
               Hamid Jafarkhani   Exploiting asynchronous
                                  amplify-and-forward relays to enhance
                                  the performance of IEEE 802.11 networks  479--490
                    Tong Ye and   
                Tony T. Lee and   
                    Weisheng Hu   AWG-based non-blocking Clos networks . . 491--504
               Po-Kai Huang and   
                    Xiaojun Lin   Achieving optimal throughput utility and
                                  low delay with CSMA-like algorithms: a
                                  virtual multichannel approach  . . . . . 505--518
                Dongyue Xue and   
            Robert Murawski and   
                    Eylem Ekici   Capacity achieving distributed
                                  scheduling with finite buffers . . . . . 519--532
               Tung-Wei Kuo and   
          Kate Ching-Ju Lin and   
                  Ming-Jer Tsai   Maximizing submodular set function with
                                  connectivity constraint: theory and
                                  application to networks  . . . . . . . . 533--546
              Lorenzo Rossi and   
           Jacob Chakareski and   
            Pascal Frossard and   
             Stefania Colonnese   A Poisson hidden Markov model for
                                  multiview video traffic  . . . . . . . . 547--558
               Armin Banaei and   
          Daren B. H. Cline and   
      Costas N. Georghiades and   
                   Shuguang Cui   On asymptotic statistics for geometric
                                  routing schemes in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 559--573
    Sucha Supittayapornpong and   
               Michael J. Neely   Quality of information maximization for
                                  wireless networks via a fully separable
                                  quadratic policy . . . . . . . . . . . . 574--586
               Andreea Picu and   
       Thrasyvoulos Spyropoulos   DTN-meteo: forecasting the performance
                                  of DTN protocols under heterogeneous
                                  mobility . . . . . . . . . . . . . . . . 587--602
                  Zhenyu Wu and   
                   Zhang Xu and   
                   Haining Wang   Whispers in the hyper-space:
                                  high-bandwidth and reliable covert
                                  channel attacks inside the cloud . . . . 603--614
               Chih-Ping Li and   
                  Eytan Modiano   Receiver-based flow control for networks
                                  in overload  . . . . . . . . . . . . . . 616--630
                     Bin Li and   
                   Ruogu Li and   
                Atilla Eryilmaz   On the optimal convergence speed of
                                  wireless scheduling for fair resource
                                  allocation . . . . . . . . . . . . . . . 631--643
                  Qiang Liu and   
                   Xin Wang and   
            Nageswara S. V. Rao   Fusion of state estimates over long-haul
                                  sensor networks with random loss and
                                  delay  . . . . . . . . . . . . . . . . . 644--656
                Zhenhua Liu and   
               Minghong Lin and   
               Adam Wierman and   
                 Steven Low and   
           Lachlan L. H. Andrew   Greening geographical load balancing . . 657--671
             Daniele Riboni and   
            Antonio Villani and   
            Domenico Vitali and   
            Claudio Bettini and   
               Luigi V. Mancini   Obfuscation of sensitive data for
                                  incremental release of network flows . . 672--686

IEEE\slash ACM Transactions on Networking
Volume 23, Number 3, June, 2015

                      Yu Wu and   
                   Chuan Wu and   
                      Bo Li and   
              Linquan Zhang and   
                Zongpeng Li and   
              Francis C. M. Lau   Scaling social media applications into
                                  geo-distributed clouds . . . . . . . . . 689--702
          Ori Rottenstreich and   
                 Isaac Keslassy   The Bloom paradox: when not to use a
                                  Bloom filter . . . . . . . . . . . . . . 703--716
           Christoph Lenzen and   
             Philipp Sommer and   
              Roger Wattenhofer   PulseSync: an efficient and scalable
                                  clock synchronization protocol . . . . . 717--727
                     I-Hong Hou   Broadcasting delay-constrained traffic
                                  over unreliable wireless links with
                                  network coding . . . . . . . . . . . . . 728--740
           Stefano Traverso and   
                 Luca Abeni and   
               Robert Birke and   
               Csaba Kiraly and   
            Emilio Leonardi and   
            Renato Lo Cigno and   
                   Marco Mellia   Neighborhood filtering strategies for
                                  overlay construction in P2P-TV systems:
                                  design and experimental comparison . . . 741--754
               Zhongmei Yao and   
          Daren B. H. Cline and   
                Dmitri Loguinov   Unstructured P2P link lifetimes redux    755--767
               Zizhan Zheng and   
                  Zhixue Lu and   
               Prasun Sinha and   
                  Santosh Kumar   Ensuring predictable contact opportunity
                                  for scalable vehicular Internet access
                                  on the go  . . . . . . . . . . . . . . . 768--781
                 Jihwan Kim and   
              Hyang-Won Lee and   
                     Song Chong   CSMA-based robust AP throughput
                                  guarantee under user distribution
                                  uncertainty  . . . . . . . . . . . . . . 782--795
           Muhammad Shahzad and   
                    Alex X. Liu   Probabilistic optimal tree hopping for
                                  RFID identification  . . . . . . . . . . 796--809
                 Yanjun Yao and   
                   Qing Cao and   
        Athanasios V. Vasilakos   EDAL: an energy-efficient, delay-aware,
                                  and lifetime-balancing data collection
                                  protocol for heterogeneous wireless
                                  sensor networks  . . . . . . . . . . . . 810--823
                   Xia Zhou and   
              Zengbin Zhang and   
                  Gang Wang and   
                Xiaoxiao Yu and   
                Ben Y. Zhao and   
                   Haitao Zheng   Practical conflict graphs in the wild    824--835
          George Athanasiou and   
Pradeep Chathuranga Weeraddana and   
            Carlo Fischione and   
             Leandros Tassiulas   Optimizing client association for load
                                  balancing and fairness in
                                  millimeter-wave wireless networks  . . . 836--850
             Corentin Briat and   
           Emre Altug Yavuz and   
    Håkan Hjalmarsson and   
      Karl Henrik Johansson and   
        Ulf T. Jönsson and   
            Gunnar Karlsson and   
                Henrik Sandberg   The conservation of information, towards
                                  an axiomatized modular modeling approach
                                  to congestion control  . . . . . . . . . 851--865
            Maricica Nistor and   
           Daniel E. Lucani and   
             João Barros   Hardware abstraction and protocol
                                  optimization for coded sensor networks   866--879
                      Bo Ji and   
             Gagan R. Gupta and   
                Manu Sharma and   
                Xiaojun Lin and   
                 Ness B. Shroff   Achieving optimal throughput and
                                  near-optimal asymptotic delay
                                  performance in multichannel wireless
                                  networks with low complexity: a
                                  practical greedy scheduling policy . . . 880--893
                     Hu Jin and   
             Bang Chul Jung and   
             Victor C. M. Leung   Fundamental limits of CDF-based
                                  scheduling: throughput, fairness, and
                                  feedback overhead  . . . . . . . . . . . 894--907
         Stojan Trajanovski and   
        Fernando A. Kuipers and   
          Aleksandar Ili\'c and   
              Jon Crowcroft and   
               Piet Van Mieghem   Finding critical regions and
                                  region-disjoint paths in a network . . . 908--921
                Zhichao Cao and   
                    Yuan He and   
                   Qiang Ma and   
                     Yunhao Liu   $ L^2 $: lazy forwarding in
                                  low-duty-cycle wireless sensor network   922--930
        Leonidas Georgiadis and   
        Georgios S. Paschos and   
                Lavy Libman and   
             Leandros Tassiulas   Minimal evacuation times and stability   931--945
                   Fei Chen and   
      Bruhadeshwar Bezawada and   
                    Alex X. Liu   Privacy-preserving quantification of
                                  cross-domain network reachability  . . . 946--958
                 Yunbae Kim and   
                   Ganguk Hwang   Design and analysis of medium access
                                  protocol: throughput and short-term
                                  fairness perspective . . . . . . . . . . 959--972
        Kianoosh Mokhtarian and   
             Hans-Arno Jacobsen   Minimum-delay multicast algorithms for
                                  mesh overlays  . . . . . . . . . . . . . 973--986
               Haiying Shen and   
                  Yuhua Lin and   
                         Jin Li   A social-network-aided efficient
                                  peer-to-peer live streaming system . . . 987--1000
              Thang N. Dinh and   
                     My T. Thai   Network under joint node and link
                                  attacks: vulnerability assessment
                                  methods and analysis . . . . . . . . . . 1001--1011
            Abdallah Jarray and   
                 Ahmed Karmouch   Decomposition approaches for virtual
                                  network embedding with one-shot node and
                                  link mapping . . . . . . . . . . . . . . 1012--1025

IEEE\slash ACM Transactions on Networking
Volume 23, Number 4, August, 2015

    Mohammad Ali Maddah-Ali and   
                     Urs Niesen   Decentralized coded caching attains
                                  order-optimal memory-rate tradeoff . . . 1029--1040
                    Kai Han and   
                    Jun Luo and   
                  Liu Xiang and   
               Mingjun Xiao and   
                 Liusheng Huang   Achieving energy efficiency and
                                  reliability for data dissemination in
                                  duty-cycled WSNs . . . . . . . . . . . . 1041--1052
              Qingkai Liang and   
               Xinbing Wang and   
               Xiaohua Tian and   
                     Fan Wu and   
                     Qian Zhang   Two-dimensional route switching in
                                  cognitive radio networks: a
                                  game-theoretical framework . . . . . . . 1053--1066
               Ali Khanafer and   
            Murali Kodialam and   
       Krishna P. N. Puttaswamy   To rent or to buy in the presence of
                                  statistical information: the constrained
                                  ski-rental problem . . . . . . . . . . . 1067--1077
           Majid Khabbazian and   
          Stephane Durocher and   
       Alireza Haghnegahdar and   
                    Fabian Kuhn   Bounding interference in wireless ad hoc
                                  networks with nodes in random position   1078--1091
           Marcello Caleffi and   
            Ian F. Akyildiz and   
                    Luigi Paura   On the solution of the Steiner tree
                                  NP-hard problem via \bionamePhysarum
                                  BioNetwork . . . . . . . . . . . . . . . 1092--1106
               Joerg Widmer and   
             Andrea Capalbo and   
Antonio Fernández Anta and   
                  Albert Banchs   Efficient interlayer network codes for
                                  fair layered multicast streaming . . . . 1107--1120
        G. Enrico Santagati and   
            Tommaso Melodia and   
            Laura Galluccio and   
                 Sergio Palazzo   Medium access control and rate
                                  adaptation for ultrasonic intrabody
                                  sensor networks  . . . . . . . . . . . . 1121--1134
                 Yu-Sian Li and   
             Trang Minh Cao and   
              Shu-Ting Wang and   
                  Xin Huang and   
             Cheng-Hsin Hsu and   
                   Po-Ching Lin   A resource-constrained asymmetric
                                  redundancy elimination algorithm . . . . 1135--1148
                  Yang Yang and   
                   Miao Jin and   
                   Yao Zhao and   
                      Hongyi Wu   Distributed information storage and
                                  retrieval in $3$-D sensor networks with
                                  general topologies . . . . . . . . . . . 1149--1162
                Yipeng Zhou and   
               Tom Z. J. Fu and   
                  Dah Ming Chiu   A unifying model and analysis of P2P VoD
                                  replication and scheduling . . . . . . . 1163--1175
               Jianhang Gao and   
                  Qing Zhao and   
                Ananthram Swami   The thinnest path problem  . . . . . . . 1176--1189
                Hazem Gomaa and   
        Geoffrey G. Messier and   
                  Robert Davies   Hierarchical cache performance analysis
                                  under TTL-based consistency  . . . . . . 1190--1201
     Andres Garcia-Saavedra and   
          Balaji Rengarajan and   
              Pablo Serrano and   
           Daniel Camps-Mur and   
      Xavier Costa-Pérez   SOLOR: self-optimizing WLANs with
                                  legacy-compatible opportunistic relays   1202--1215
           Matthew Johnston and   
              Hyang-Won Lee and   
                  Eytan Modiano   A robust optimization approach to backup
                                  network design with random failures  . . 1216--1228
    Spyridon Antonakopoulos and   
             Yigal Bejerano and   
                  Pramod Koppol   Full protection made easy: the DisPath
                                  IP fast reroute scheme . . . . . . . . . 1229--1242
              Pablo Serrano and   
     Andres Garcia-Saavedra and   
           Giuseppe Bianchi and   
              Albert Banchs and   
                 Arturo Azcorra   Per-frame energy consumption in 802.11
                                  devices and its implication on modeling
                                  and design . . . . . . . . . . . . . . . 1243--1256
                  Jun Zhang and   
                  Xiao Chen and   
                 Yang Xiang and   
                Wanlei Zhou and   
                         Jie Wu   Robust network traffic classification    1257--1270
                     Fan Wu and   
               Qianyi Huang and   
                  Yixin Tao and   
                    Guihai Chen   Towards privacy preservation in
                                  strategy-proof spectrum auction
                                  mechanisms for noncooperative wireless
                                  networks . . . . . . . . . . . . . . . . 1271--1285
        Hisham M. Almasaeid and   
                 Ahmed E. Kamal   Receiver-based channel allocation in
                                  cognitive radio wireless mesh networks   1286--1299
          Matteo Dell'Amico and   
         Maurizio Filippone and   
           Pietro Michiardi and   
                   Yves Roudier   On user availability prediction and
                                  network applications . . . . . . . . . . 1300--1313
             Enrico Gregori and   
         Alessandro Improta and   
            Luciano Lenzini and   
              Lorenzo Rossi and   
                      Luca Sani   A novel methodology to address the
                                  Internet AS-level data incompleteness    1314--1327
                  Chao Yang and   
                   Scott Jordan   A novel coordinated connection access
                                  control and resource allocation
                                  framework for $4$G wireless networks . . 1328--1341
                   Yu Cheng and   
                 Hongkun Li and   
      Devu Manikantan Shila and   
                   Xianghui Cao   A systematic study of maximal scheduling
                                  algorithms in multiradio multichannel
                                  wireless networks  . . . . . . . . . . . 1342--1355
             Yuanqing Zheng and   
                          Mo Li   P-MTI: physical-layer missing tag
                                  identification via compressive sensing   1356--1366
                  Fan Zhang and   
                  Yewen Cao and   
                   Deqiang Wang   Comments and corrections: a note on
                                  ``Low-complexity distributed scheduling
                                  algorithms for wireless networks'' . . . 1367--1369

IEEE\slash ACM Transactions on Networking
Volume 23, Number 5, October, 2015

              Francois Clad and   
         Stefano Vissicchio and   
     Pascal Mérindol and   
            Pierre Francois and   
           Jean-Jacques Pansiot   Computing minimal update sequences for
                                  graceful router-wide reconfigurations    1373--1386
             Anne Bouillard and   
                  Giovanni Stea   Exact worst-case delay in
                                  FIFO-multiplexing feed-forward networks  1387--1400
       Sk Kajal Arefin Imon and   
                 Adnan Khan and   
         Mario Di Francesco and   
                   Sajal K. Das   Energy-efficient randomized switching
                                  for maximizing lifetime in tree-based
                                  wireless sensor networks . . . . . . . . 1401--1415
                    Yi-Sheng Su   Topology-transparent scheduling via the
                                  Chinese remainder theorem  . . . . . . . 1416--1429
                   Lei Yang and   
           Yalin E. Sagduyu and   
              Junshan Zhang and   
                    Jason H. Li   Deadline-aware scheduling with adaptive
                                  network coding for real-time traffic . . 1430--1443
              Barlas O\uguz and   
          Venkat Anantharam and   
                   Ilkka Norros   Stable distributed P2P protocols based
                                  on random peer sampling  . . . . . . . . 1444--1456
             Yunus Sarikaya and   
              Ozgur Ercetin and   
                Can Emre Koksal   Confidentiality-preserving control of
                                  uplink cellular wireless networks using
                                  hybrid ARQ . . . . . . . . . . . . . . . 1457--1470
                    Xu Chen and   
               Brian Proulx and   
               Xiaowen Gong and   
                  Junshan Zhang   Exploiting social ties for cooperative
                                  D$2$D communications: a mobile social
                                  networking case  . . . . . . . . . . . . 1471--1484
           Mina Yazdanpanah and   
                 Chadi Assi and   
               Samir Sebbah and   
                  Yousef Shayan   Does network coding combined with
                                  interference cancellation bring any gain
                                  to a wireless network? . . . . . . . . . 1485--1500
               Sergi Abadal and   
             Mario Iannazzo and   
           Mario Nemirovsky and   
   Albert Cabellos-Aparicio and   
                Heekwan Lee and   
          Eduard Alarcón   On the area and energy scalability of
                                  wireless network-on-chip: a model-based
                                  benchmarked design space exploration . . 1501--1513
                 Chenxi Qiu and   
               Haiying Shen and   
            Sohraab Soltani and   
                Karan Sapra and   
                  Hao Jiang and   
             Jason O. Hallstrom   CEDAR: a low-latency and distributed
                                  strategy for packet recovery in wireless
                                  networks . . . . . . . . . . . . . . . . 1514--1527
    Ioannis Ch. Paschalidis and   
               Fuzhuo Huang and   
                        Wei Lai   A message-passing algorithm for wireless
                                  network scheduling . . . . . . . . . . . 1528--1541
                     Bin Li and   
                   Ruogu Li and   
                Atilla Eryilmaz   Throughput-optimal scheduling design
                                  with regular service guarantees in
                                  wireless networks  . . . . . . . . . . . 1542--1552
               Sameh Sorour and   
                Shahrokh Valaee   Completion delay minimization for
                                  instantly decodable network codes  . . . 1553--1567
               Timothy Wood and   
         K. K. Ramakrishnan and   
            Prashant Shenoy and   
      Jacobus Van Der Merwe and   
                Jinho Hwang and   
                  Guyue Liu and   
             Lucas Chaufournier   CloudNet: dynamic pooling of cloud
                                  resources by live WAN migration of
                                  virtual machines . . . . . . . . . . . . 1568--1583
            Sharayu Moharir and   
              Sanjay Shakkottai   Max weight versus back pressure: routing
                                  and scheduling in multichannel relay
                                  networks . . . . . . . . . . . . . . . . 1584--1598
            Ferhat Dikbiyik and   
          Massimo Tornatore and   
            Biswanath Mukherjee   Exploiting excess capacity, part II:
                                  differentiated services under traffic
                                  growth . . . . . . . . . . . . . . . . . 1599--1609
András Gulyás and   
Gábor Rétvári and   
    Zalán Heszberger and   
                 Rachit Agarwal   On the scalability of routing with
                                  policies . . . . . . . . . . . . . . . . 1610--1618
            Enrique Mallada and   
              Xiaoqiao Meng and   
                Michel Hack and   
                   Li Zhang and   
                        Ao Tang   Skewless network clock synchronization
                                  without discontinuity: convergence and
                                  performance  . . . . . . . . . . . . . . 1619--1633
           George Iosifidis and   
                    Lin Gao and   
              Jianwei Huang and   
             Leandros Tassiulas   A double-auction mechanism for mobile
                                  data-offloading markets  . . . . . . . . 1634--1647
                     Dan Li and   
                   Jing Zhu and   
                Jianping Wu and   
                Junjie Guan and   
                     Ying Zhang   Guaranteeing heterogeneous bandwidth
                                  demand in multitenant data center
                                  networks . . . . . . . . . . . . . . . . 1648--1660
                     Wei Du and   
               Yongjun Liao and   
                 Narisu Tao and   
              Pierre Geurts and   
                Xiaoming Fu and   
                      Guy Leduc   Rating network paths for locality-aware
                                  overlay construction and routing . . . . 1661--1673
                 Virag Shah and   
             Gustavo De Veciana   High-performance centralized content
                                  delivery infrastructure: models and
                                  asymptotics  . . . . . . . . . . . . . . 1674--1687
                    Tao Shu and   
              Yingying Chen and   
                       Jie Yang   Protecting multi-lateral localization
                                  privacy in pervasive environments  . . . 1688--1701
                   Dahai Xu and   
                Mung Chiang and   
               Jennifer Rexford   Corrections to ``Link-state routing with
                                  hop-by-hop forwarding can achieve
                                  optimal traffic engineering''  . . . . . 1702--1703


IEEE\slash ACM Transactions on Networking
Volume 24, Number 1, February, 2016

               Reza Abdolee and   
               Benoit Champagne   Diffusion LMS strategies in sensor
                                  networks with noisy input data . . . . . 3--14
           Nikolaos Chrysos and   
                 Lydia Chen and   
       Christoforos Kachris and   
              Manolis Katevenis   Discharging the network from its flow
                                  control headaches: packet drops and HOL
                                  blocking . . . . . . . . . . . . . . . . 15--28
         Emir Kavurmacioglu and   
             Murat Alanyali and   
              David Starobinski   Competition in private commons: price
                                  war or market sharing? . . . . . . . . . 29--42
                 Hongyu Gao and   
          Vinod Yegneswaran and   
                 Jian Jiang and   
                   Yan Chen and   
             Phillip Porras and   
              Shalini Ghosh and   
                    Haixin Duan   Reexamining DNS from a global recursive
                                  resolver perspective . . . . . . . . . . 43--57
                   Can Zhao and   
                Xiaojun Lin and   
                       Chuan Wu   The streaming capacity of sparsely
                                  connected P2P systems with distributed
                                  control  . . . . . . . . . . . . . . . . 58--71
               Xiaohan Kang and   
                 Weina Wang and   
 Juan José Jaramillo and   
                       Lei Ying   On the performance of
                                  largest-deficit-first for scheduling
                                  real-time traffic in wireless networks   72--84
               Chih-Yu Wang and   
                Chun-Han Ko and   
                Hung-Yu Wei and   
        Athanasios V. Vasilakos   A voting-based femtocell downlink
                                  cell-breathing control mechanism . . . . 85--98
                   Lei Jiao and   
                     Jun Li and   
                 Tianyin Xu and   
                     Wei Du and   
                    Xiaoming Fu   Optimizing cost for online social
                                  networks on geo-distributed clouds . . . 99--112
             Mohamed Kashef and   
             Anthony Ephremides   Optimal partial relaying for
                                  energy-harvesting wireless networks  . . 113--122
               Ted H. Szymanski   An ultra-low-latency guaranteed-rate
                                  Internet for cloud services  . . . . . . 123--136
    Eunice Adjarath Lemamou and   
          Philippe Galinier and   
             Steven Chamberland   A hybrid iterated local search algorithm
                                  for the global planning problem of
                                  survivable 4G wireless networks  . . . . 137--148
Gábor Rétvári and   
      János Tapolcai and   
       Attila K\Horösi and   
András Majdán and   
        Zalán Heszberger   Compressing IP forwarding tables:
                                  towards entropy bounds and beyond  . . . 149--162
         Parinaz Naghizadeh and   
                    Mingyan Liu   Perceptions and truth: a mechanism
                                  design approach to crowd-sourcing
                                  reputation . . . . . . . . . . . . . . . 163--176
                Zhoujia Mao and   
            Can Emre Koksal and   
                 Ness B. Shroff   Optimal online scheduling with arbitrary
                                  hard deadlines in multihop communication
                                  networks . . . . . . . . . . . . . . . . 177--189
                 Weina Wang and   
                    Kai Zhu and   
                   Lei Ying and   
                   Jian Tan and   
                       Li Zhang   MapTask scheduling in MapReduce with
                                  data locality: throughput and
                                  heavy-traffic optimality . . . . . . . . 190--203
         Hussein Al-Zubaidy and   
        Jörg Liebeherr and   
                 Almut Burchard   Network-layer performance analysis of
                                  multihop fading channels . . . . . . . . 204--217
          Marcin Bienkowski and   
         Leszek G\kasieniec and   
            Marek Klonowski and   
      Miroslaw Korzeniowski and   
               Bernard Mans and   
              Stefan Schmid and   
              Roger Wattenhofer   Distributed alarming in the on-duty and
                                  off-duty models  . . . . . . . . . . . . 218--230
                  Chen Qian and   
                   Simon S. Lam   A scalable and resilient layer-2 network
                                  with Ethernet compatibility  . . . . . . 231--244
                 Eleni Stai and   
       Symeon Papavassiliou and   
                  John S. Baras   Performance-aware cross-layer design in
                                  wireless multihop networks via a
                                  weighted backpressure approach . . . . . 245--258
               Xiaowen Gong and   
              Junshan Zhang and   
            Douglas Cochran and   
                       Kai Xing   Optimal placement for barrier coverage
                                  in bistatic radar sensor networks  . . . 259--271
                  Feng Wang and   
             Jiangchuan Liu and   
               Minghua Chen and   
                   Haiyang Wang   Migration towards cloud-assisted live
                                  media streaming  . . . . . . . . . . . . 272--282
              Soheil Eshghi and   
          M. H. R. Khouzani and   
             Saswati Sarkar and   
           Santosh S. Venkatesh   Optimal patching in clustered malware
                                  epidemics  . . . . . . . . . . . . . . . 283--298
               Giusi Alfano and   
            Michele Garetto and   
                Emilio Leonardi   Content-centric wireless networks with
                                  limited buffers: when mobility hurts . . 299--311
                Ziling Zhou and   
                Binbin Chen and   
                     Haifeng Yu   Understanding RFID counting protocols    312--327
                  Guang Tan and   
                Zhimeng Yin and   
                   Hongbo Jiang   Trap array: a unified model for
                                  scalability evaluation of geometric
                                  routing  . . . . . . . . . . . . . . . . 328--341
           Jeremy M. Plante and   
               Arush Gadkar and   
             Vinod M. Vokkarane   Manycast overlay in split-incapable
                                  networks for supporting
                                  bandwidth-intensive applications . . . . 342--354
           Robert Margolies and   
           Ashwin Sridharan and   
            Vaneet Aggarwal and   
               Rittwik Jana and   
    N. K. Shankaranarayanan and   
      Vinay A. Vaishampayan and   
                    Gil Zussman   Exploiting mobility in proportional fair
                                  cellular scheduling: measurements and
                                  algorithms . . . . . . . . . . . . . . . 355--367
         Pedro E. Santacruz and   
            Vaneet Aggarwal and   
             Ashutosh Sabharwal   Leveraging physical-layer capabilities:
                                  distributed scheduling in interference
                                  networks with local views  . . . . . . . 368--382
            Kundan Kandhway and   
                       Joy Kuri   Campaigning in heterogeneous social
                                  networks: optimal control of SI
                                  information epidemics  . . . . . . . . . 383--396
                    Wen Luo and   
                   Yan Qiao and   
               Shigang Chen and   
                       Min Chen   An efficient protocol for RFID
                                  multigroup threshold-based
                                  classification based on sampling and
                                  logical bitmap . . . . . . . . . . . . . 397--407
                    Kai Zhu and   
                       Lei Ying   Information source detection in the SIR
                                  model: a sample-path-based approach  . . 408--421
                  Chen Chen and   
         Hans-Arno Jacobsen and   
                Roman Vitenberg   Algorithms based on divide and conquer
                                  for topic-based publish/subscribe
                                  overlay design . . . . . . . . . . . . . 422--436
         Valentino Pacifici and   
            Frank Lehrieder and   
         György Dán   Cache bandwidth allocation for P2P
                                  file-sharing systems to minimize
                                  inter-ISP traffic  . . . . . . . . . . . 437--448
                  Qiang Liu and   
                   Xin Wang and   
        Nageswara S. V. Rao and   
          Katharine Brigham and   
          B. V. K. Vijaya Kumar   Effect of retransmission and
                                  retrodiction on estimation and fusion in
                                  long-haul sensor networks  . . . . . . . 449--461
                 Fengyu Gao and   
                   Hongyan Qian   Efficient, real-world token bucket
                                  configuration for residential gateways   462--475
        Sophia Athanasiadou and   
           Marios Gatzianas and   
        Leonidas Georgiadis and   
             Leandros Tassiulas   Stable XOR-based policies for the
                                  broadcast erasure channel with feedback  476--491
              Albert Banchs and   
                Jorge Ortin and   
     Andres Garcia-Saavedra and   
           Douglas J. Leith and   
                  Pablo Serrano   Thwarting selfish behavior in 802.11
                                  WLANs  . . . . . . . . . . . . . . . . . 492--505
               Florin Coras and   
      Jordi Domingo-Pascual and   
               Darrel Lewis and   
       Albert Cabellos-Aparicio   An analytical model for Loc/ID mappings
                                  caches . . . . . . . . . . . . . . . . . 506--516
                     Yi Gao and   
                   Wei Dong and   
                  Chun Chen and   
                  Jiajun Bu and   
                  Wenbin Wu and   
                        Xue Liu   iPath: path inference in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 517--528
          Jayakrishnan Nair and   
          Martin Andreasson and   
       Lachlan L. H. Andrew and   
              Steven H. Low and   
                  John C. Doyle   On channel failures, file fragmentation
                                  policies, and heavy-tailed completion
                                  times  . . . . . . . . . . . . . . . . . 529--541
    Mohammad Hadi Afrasiabi and   
             Roch Guérin   Exploring user-provided connectivity . . 542--554
          Ori Rottenstreich and   
             Isaac Keslassy and   
          Avinatan Hassidim and   
                Haim Kaplan and   
                      Ely Porat   Optimal in/out TCAM encodings of ranges  555--568
            Flavio Esposito and   
            Donato Di Paola and   
                  Ibrahim Matta   On distributed virtual network embedding
                                  with guarantees  . . . . . . . . . . . . 569--582
               Xiaochun Yun and   
                Yipeng Wang and   
            Yongzheng Zhang and   
                        Yu Zhou   A semantics-aware approach to the
                                  automated network protocol
                                  identification . . . . . . . . . . . . . 583--595
                 Qiuyu Peng and   
                Anwar Walid and   
              Jaehyun Hwang and   
                  Steven H. Low   Multipath TCP: analysis, design, and
                                  implementation . . . . . . . . . . . . . 596--609
                 James Daly and   
                Alex X. Liu and   
                     Eric Torng   A difference resolution approach to
                                  compressing access control lists . . . . 610--623
         Ahmed Farhan Hanif and   
            Hamidou Tembine and   
             Mohamad Assaad and   
               Djamal Zeghlache   Mean-field games for resource sharing in
                                  cloud-based networks . . . . . . . . . . 624--637

IEEE\slash ACM Transactions on Networking
Volume 24, Number 2, April, 2016

                  Dong Zhao and   
              Xiang-Yang Li and   
                     Huadong Ma   Budget-feasible online incentive
                                  mechanisms for crowdsourcing tasks
                                  truthfully . . . . . . . . . . . . . . . 647--661
                  Daibo Liu and   
                Mengshu Hou and   
                Zhichao Cao and   
               Jiliang Wang and   
                    Yuan He and   
                     Yunhao Liu   Duplicate detectable opportunistic
                                  forwarding in duty-cycled wireless
                                  sensor networks  . . . . . . . . . . . . 662--673
              Joaquim Oller and   
             Ilker Demirkol and   
           Jordi Casademont and   
            Josep Paradells and   
           Gerd Ulrich Gamm and   
                Leonhard Reindl   Has time come to switch from duty-cycled
                                  MAC protocols to wake-up radio for
                                  wireless sensor networks?  . . . . . . . 674--687
            Abhishek Mishra and   
        Parv Venkitasubramaniam   Anonymity and fairness in packet
                                  scheduling: a quantitative tradeoff  . . 688--702
                   Min Chen and   
                    Wen Luo and   
                    Zhen Mo and   
               Shigang Chen and   
                   Yuguang Fang   An efficient tag search protocol in
                                  large-scale RFID systems with noisy
                                  channel  . . . . . . . . . . . . . . . . 703--716
      Alireza Shams Shafigh and   
            Beatriz Lorenzo and   
                Savo Glisic and   
  Jordi Pérez-Romero and   
            Luiz A. DaSilva and   
         Allen B. MacKenzie and   
               Juha Röning   A framework for dynamic network
                                  architecture and topology optimization   717--730
           Zakaria Al-Qudah and   
              Eamon Johnson and   
         Michael Rabinovich and   
              Oliver Spatscheck   Internet with transient
                                  destination-controlled addressing  . . . 731--744
                  Zhi Zhang and   
             Yigal Bejerano and   
        Spyridon Antonakopoulos   Energy-efficient IP core network
                                  configuration under general traffic
                                  demands  . . . . . . . . . . . . . . . . 745--758
               Michael J. Neely   Distributed stochastic optimization via
                                  correlated scheduling  . . . . . . . . . 759--772
            Sazzadur Rahman and   
             Ting-Kai Huang and   
       Harsha V. Madhyastha and   
             Michalis Faloutsos   Detecting malicious Facebook
                                  applications . . . . . . . . . . . . . . 773--787
                Xudong Wang and   
                   Wenguang Mao   Analog network coding without
                                  restrictions on superimposed frames  . . 788--805
                  Tong Meng and   
                     Fan Wu and   
                    Guihai Chen   Code-based neighbor discovery protocols
                                  in mobile wireless networks  . . . . . . 806--819
               Vinay Joseph and   
                  Sem Borst and   
               Martin I. Reiman   Optimal rate allocation for video
                                  streaming in wireless networks with user
                                  dynamics . . . . . . . . . . . . . . . . 820--835
           Ramtin Pedarsani and   
    Mohammad Ali Maddah-Ali and   
                     Urs Niesen   Online coded caching . . . . . . . . . . 836--845
                Jinsong Han and   
                  Chen Qian and   
               Panlong Yang and   
                     Dan Ma and   
              Zhiping Jiang and   
                     Wei Xi and   
                   Jizhong Zhao   GenePrint: generic and accurate
                                  physical-layer identification for UHF
                                  RFID tags  . . . . . . . . . . . . . . . 846--858
                    Kun Xie and   
                   Xin Wang and   
                 Jigang Wen and   
                   Jiannong Cao   Cooperative routing with relay
                                  assignment in multiradio multihop
                                  wireless networks  . . . . . . . . . . . 859--872
                   Jian Guo and   
               Fangming Liu and   
             John C. S. Lui and   
                        Hai Jin   Fair network bandwidth allocation in
                                  IaaS datacenters via a cooperative game
                                  approach . . . . . . . . . . . . . . . . 873--886
               Hongkun Yang and   
                   Simon S. Lam   Real-time verification of network
                                  properties using atomic predicates . . . 887--900
          Mustafa Y. Arslan and   
     Karthikeyan Sundaresan and   
  Srikanth V. Krishnamurthy and   
             Sampath Rangarajan   iBUS: an integrated beamformer and
                                  uplink scheduler for OFDMA small cells   901--914
     Karthikeyan Sundaresan and   
          Mustafa Y. Arslan and   
           Shailendra Singh and   
         Sampath Rangarajan and   
      Srikanth V. Krishnamurthy   FluidNet: a flexible cloud-based radio
                                  access network for small cells . . . . . 915--928
              Huiyuan Zhang and   
             Dung T. Nguyen and   
              Huiling Zhang and   
                     My T. Thai   Least cost influence maximization across
                                  multiple social networks . . . . . . . . 929--939
                   Chee Wei Tan   Optimal power control in Rayleigh-fading
                                  heterogeneous wireless networks  . . . . 940--953
                   Ying Cui and   
              Edmund M. Yeh and   
                        Ran Liu   Enhancing the delay performance of
                                  dynamic backpressure algorithms  . . . . 954--967
                  Rihua Wei and   
                    Yang Xu and   
               H. Jonathan Chao   Finding nonequivalent classifiers in
                                  Boolean space to reduce TCAM usage . . . 968--981
          Jayakrishnan Nair and   
        Krishna Jagannathan and   
                   Adam Wierman   When heavy-tailed and light-tailed flows
                                  compete: the response time tail under
                                  generalized max-weight scheduling  . . . 982--995
          Hasti A. Pedersen and   
                      Sujit Dey   Enhancing mobile video capacity and
                                  quality using rate adaptation, RAN
                                  caching and processing . . . . . . . . . 996--1010
              Mingchen Zhao and   
               Wenchao Zhou and   
     Alexander J. T. Gurney and   
          Andreas Haeberlen and   
                Micah Sherr and   
                  Boon Thau Loo   Private and verifiable interdomain
                                  routing decisions  . . . . . . . . . . . 1011--1024
                    Han Cai and   
               Irem Koprulu and   
                 Ness B. Shroff   Exploiting double opportunities for
                                  latency-constrained content propagation
                                  in wireless networks . . . . . . . . . . 1025--1037
                    Tao Han and   
                  Nirwan Ansari   A traffic load balancing framework for
                                  software-defined radio access networks
                                  powered by hybrid energy sources . . . . 1038--1051
                   Wei Gong and   
           Ivan Stojmenovic and   
                Amiya Nayak and   
                  Kebin Liu and   
                   Haoxiang Liu   Fast and scalable counterfeits
                                  estimation for large-scale RFID systems  1052--1064
          Chandramani Singh and   
               Anurag Kumar and   
              Rajesh Sundaresan   Combined base station association and
                                  power control in multichannel cellular
                                  networks . . . . . . . . . . . . . . . . 1065--1080
             Dong-Hoon Shin and   
                   Shibo He and   
                  Junshan Zhang   Robust and cost-effective design of
                                  cyber-physical systems: an optimal
                                  middleware deployment approach . . . . . 1081--1094
            Sang-Yoon Chang and   
                Yih-Chun Hu and   
                Nicola Laurenti   SimpleMAC: a simple wireless MAC-layer
                                  countermeasure to intelligent and
                                  insider jammers  . . . . . . . . . . . . 1095--1108
             Gaurav Agrawal and   
                     Deep Medhi   Embedding IP unique shortest path
                                  topology on a wavelength-routed network:
                                  normal and survivable design . . . . . . 1109--1124
             Dao-Yuan Chang and   
                  Pi-Chung Wang   TCAM-based multi-match packet
                                  classification using multidimensional
                                  rule layering  . . . . . . . . . . . . . 1125--1138
                 Xuanyu Cao and   
               Jinbei Zhang and   
                   Luoyi Fu and   
                  Weijie Wu and   
                   Xinbing Wang   Optimal secrecy capacity-delay tradeoff
                                  in large-scale mobile ad hoc networks    1139--1152
               Zhangyu Guan and   
            Tommaso Melodia and   
               Gesualdo Scutari   To transmit or not to transmit?:
                                  distributed queueing games in
                                  infrastructureless wireless networks . . 1153--1166
           Abhijeet Bhorkar and   
         Mohammad Naghshvar and   
                    Tara Javidi   Opportunistic routing with congestion
                                  diversity in wireless ad hoc networks    1167--1180
             Yunus Sarikaya and   
             C. Emre Koksal and   
                  Ozgur Ercetin   Dynamic network control for confidential
                                  multi-hop communications . . . . . . . . 1181--1195
            Majed Alresaini and   
         Kwame-Lante Wright and   
     Bhaskar Krishnamachari and   
               Michael J. Neely   Backpressure delay enhancement for
                                  encounter-based mobile networks while
                                  sustaining throughput optimality . . . . 1196--1208
                Guan-Hua Tu and   
                 Yuanjie Li and   
                Chunyi Peng and   
                  Chi-Yu Li and   
                      Songwu Lu   Detecting problematic control-plane
                                  protocol interactions in mobile networks 1209--1222
                Ashok Anand and   
        Athula Balachandran and   
              Aditya Akella and   
                 Vyas Sekar and   
              Srinivasan Seshan   Enhancing video accessibility and
                                  availability using information-bound
                                  references . . . . . . . . . . . . . . . 1223--1236
                 Andra Lutu and   
            Marcelo Bagnulo and   
            Cristel Pelsser and   
               Olaf Maennel and   
               Jesus Cid-Sueiro   The BGP visibility toolkit: detecting
                                  anomalous Internet routing behavior  . . 1237--1250
               Kirill Kogan and   
        Sergey I. Nikolenko and   
          Ori Rottenstreich and   
            William Culhane and   
                Patrick Eugster   Exploiting order independence for
                                  scalable and expressive packet
                                  classification . . . . . . . . . . . . . 1251--1264
               Shizhen Zhao and   
                    Xiaojun Lin   Design of scheduling algorithms for
                                  end-to-end backlog minimization in
                                  wireless multi-hop networks under
                                  $k$-hop interference models  . . . . . . 1265--1278
                Qingsi Wang and   
                    Mingyan Liu   Learning in hide-and-seek  . . . . . . . 1279--1292

IEEE\slash ACM Transactions on Networking
Volume 24, Number 3, June, 2016

                Alex X. Liu and   
            Chad R. Meiners and   
                     Eric Torng   Packet classification using binary
                                  content addressable memory . . . . . . . 1295--1307
           M. Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
        Shobha Venkataraman and   
                       Jia Wang   Characterizing and optimizing cellular
                                  network performance during crowded
                                  events . . . . . . . . . . . . . . . . . 1308--1321
              Soongeol Kwon and   
               Natarajan Gautam   Time-stable performance in parallel
                                  queues with non-homogeneous and
                                  multi-class workloads  . . . . . . . . . 1322--1335
            Abishek Gopalan and   
     Srinivasan Ramasubramanian   IP fast rerouting and disjoint multipath
                                  routing with three edge-independent
                                  spanning trees . . . . . . . . . . . . . 1336--1349
                     Yi Qin and   
               Xiaohua Tian and   
                  Weijie Wu and   
                   Xinbing Wang   Mobility weakens the distinction between
                                  multicast and unicast  . . . . . . . . . 1350--1363
                      Yu Lu and   
               Mehul Motani and   
                Wai-Choong Wong   A QoE-aware resource distribution
                                  framework incentivizing context sharing
                                  and moderate competition . . . . . . . . 1364--1377
                  Richard J. La   Interdependent security with strategic
                                  agents and cascades of infection . . . . 1378--1391
                     Yi Gao and   
                   Wei Dong and   
                  Wenbin Wu and   
                  Chun Chen and   
              Xiang-Yang Li and   
                      Jiajun Bu   Scalpel: scalable preferential link
                                  tomography based on graph trimming . . . 1392--1403
                    Jia Liu and   
             Ness B. Shroff and   
               Cathy H. Xia and   
               Hanif D. Sherali   Joint congestion control and routing
                                  optimization: an efficient second-order
                                  distributed approach . . . . . . . . . . 1404--1420
              Stefan Schmid and   
                  Chen Avin and   
       Christian Scheideler and   
        Michael Borokhovich and   
          Bernhard Haeupler and   
                     Zvi Lotker   SplayNet: towards locally self-adjusting
                                  networks . . . . . . . . . . . . . . . . 1421--1433
                    Wei Dai and   
                   Scott Jordan   ISP service tier design  . . . . . . . . 1434--1447
                   Tian Pan and   
                 Ting Zhang and   
                Junxiao Shi and   
                    Yang Li and   
                Linxiao Jin and   
                 Fuliang Li and   
                Jiahai Yang and   
             Beichuan Zhang and   
                Xueren Yang and   
               Mingui Zhang and   
                Huichen Dai and   
                        Bin Liu   Towards zero-time wakeup of line cards
                                  in power-aware routers . . . . . . . . . 1448--1461
                    Kai Han and   
                  Chi Zhang and   
                        Jun Luo   Taming the uncertainty: budget limited
                                  robust crowdsensing through online
                                  learning . . . . . . . . . . . . . . . . 1462--1475
               Changhee Joo and   
                Xiaojun Lin and   
                   Jiho Ryu and   
                 Ness B. Shroff   Distributed greedy approximation to
                                  maximum weighted independent set for
                                  scheduling with fading channels  . . . . 1476--1488
            Matti Siekkinen and   
    Mohammad Ashraful Hoque and   
              Jukka K. Nurminen   Using viewing statistics to control
                                  energy and traffic overhead in mobile
                                  video streaming  . . . . . . . . . . . . 1489--1503
                  Huasen Wu and   
                Xiaojun Lin and   
                    Xin Liu and   
                 Youguang Zhang   Application-level scheduling with
                                  probabilistic deadline constraints . . . 1504--1517
              Rafael Laufer and   
              Leonard Kleinrock   The capacity of wireless CSMA/CA
                                  networks . . . . . . . . . . . . . . . . 1518--1532
            Morteza Mardani and   
          Georgios B. Giannakis   Estimating traffic and anomaly maps via
                                  network tomography . . . . . . . . . . . 1533--1547
                   Yan Qiao and   
               Shigang Chen and   
                     Tao Li and   
                   Shiping Chen   Tag-ordering polling protocols in RFID
                                  systems  . . . . . . . . . . . . . . . . 1548--1561
             Sachin Kadloor and   
             Negar Kiyavash and   
        Parv Venkitasubramaniam   Mitigating timing side channel in shared
                                  schedulers . . . . . . . . . . . . . . . 1562--1573
             Pouya Ostovari and   
                     Jie Wu and   
         Abdallah Khreishah and   
                 Ness B. Shroff   Scalable video streaming with helper
                                  nodes using random linear network coding 1574--1587
              Ahmad Beirami and   
             Mohsen Sardari and   
                 Faramarz Fekri   Packet-level network compression:
                                  realization and scaling of the
                                  network-wide benefits  . . . . . . . . . 1588--1604
                Jinsong Han and   
                  Chen Qian and   
                  Xing Wang and   
                     Dan Ma and   
               Jizhong Zhao and   
                     Wei Xi and   
              Zhiping Jiang and   
                       Zhi Wang   Twins: device-free object tracking using
                                  passive tags . . . . . . . . . . . . . . 1605--1617
                    Hang Li and   
                Chuan Huang and   
                 Ping Zhang and   
               Shuguang Cui and   
                  Junshan Zhang   Distributed opportunistic scheduling for
                                  energy harvesting based wireless
                                  networks: a two-stage probing approach   1618--1631
              Yongmin Zhang and   
                   Shibo He and   
                    Jiming Chen   Data gathering optimization by dynamic
                                  sensing and routing in rechargeable
                                  sensor networks  . . . . . . . . . . . . 1632--1646
               Jeongho Kwak and   
               Okyoung Choi and   
                 Song Chong and   
              Prasant Mohapatra   Processor-network speed scaling for
                                  energy: delay tradeoff in smartphone
                                  applications . . . . . . . . . . . . . . 1647--1660
                 Jongho Won and   
             Chris Y. T. Ma and   
            David K. Y. Yau and   
            Nageswara S. V. Rao   Privacy-assured aggregation protocol for
                                  smart metering: a proactive
                                  fault-tolerant approach  . . . . . . . . 1661--1674
               Zhangyu Guan and   
            Tommaso Melodia and   
              Dongfeng Yuan and   
              Dimitris A. Pados   Distributed resource management for
                                  cognitive ad hoc networks with
                                  cooperative relays . . . . . . . . . . . 1675--1689
            Sharayu Moharir and   
             Sujay Sanghavi and   
              Sanjay Shakkottai   Online load balancing under graph
                                  constraints  . . . . . . . . . . . . . . 1690--1703
              Matteo Avalle and   
               Fulvio Risso and   
                 Riccardo Sisto   Scalable algorithms for NFA
                                  multi-striding and NFA-based deep packet
                                  inspection on GPUs . . . . . . . . . . . 1704--1717
                 Kobi Cohen and   
                    Amir Leshem   Distributed game-theoretic optimization
                                  and management of multichannel ALOHA
                                  networks . . . . . . . . . . . . . . . . 1718--1731
                 Dejun Yang and   
               Guoliang Xue and   
                    Xi Fang and   
                      Jian Tang   Incentive mechanisms for crowdsensing:
                                  crowdsourcing with smartphones . . . . . 1732--1744
                Jinsung Lee and   
                  Hojin Lee and   
                    Yung Yi and   
                 Song Chong and   
         Edward W. Knightly and   
                    Mung Chiang   Making 802.11 DCF near-optimal: design,
                                  implementation, and evaluation . . . . . 1745--1758
                    Kai Liu and   
            Joseph K. Y. Ng and   
           Victor C. S. Lee and   
                Sang H. Son and   
               Ivan Stojmenovic   Cooperative data scheduling in hybrid
                                  vehicular ad hoc networks: VANET as a
                                  software defined network . . . . . . . . 1759--1773
             Seon Yeong Han and   
       Nael B. Abu-Ghazaleh and   
                    Dongman Lee   Efficient and consistent path loss model
                                  for mobile network simulation  . . . . . 1774--1786
            Hulya Seferoglu and   
                  Eytan Modiano   Separation of routing and scheduling in
                                  backpressure: based wireless networks    1787--1800
             Wenzhuo Ouyang and   
            Atilla Eryilmaz and   
                 Ness B. Shroff   Downlink scheduling over Markovian
                                  fading channels  . . . . . . . . . . . . 1801--1812
           Roberto Gonzalez and   
               Ruben Cuevas and   
              Reza Motamedi and   
                Reza Rejaie and   
                   Angel Cuevas   Assessing the evolution of Google+ in
                                  its first two years  . . . . . . . . . . 1813--1826
                Hongxing Li and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   Virtual machine trading in a federation
                                  of clouds: individual profit and social
                                  welfare maximization . . . . . . . . . . 1827--1840
                   Xun Gong and   
                 Negar Kiyavash   Quantifying the information leakage in
                                  timing side channels in deterministic
                                  work-conserving schedulers . . . . . . . 1841--1852
               Jose Yallouz and   
          Ori Rottenstreich and   
                     Ariel Orda   Tunable survivable spanning trees  . . . 1853--1866
                     Bin Li and   
                   Ruogu Li and   
                Atilla Eryilmaz   Wireless scheduling design for
                                  optimizing both service regularity and
                                  mean delay in heavy-traffic regimes  . . 1867--1880
               Qianyi Huang and   
                   Yang Gui and   
                     Fan Wu and   
                Guihai Chen and   
                     Qian Zhang   A general privacy-preserving auction
                                  mechanism for secondary spectrum markets 1881--1893
                Arnob Ghosh and   
                 Saswati Sarkar   Quality-sensitive price competition in
                                  secondary market spectrum oligopoly:
                                  single location game . . . . . . . . . . 1894--1907
                Zizhong Cao and   
            Murali Kodialam and   
                 T. V. Lakshman   Joint static and dynamic traffic
                                  scheduling in data center networks . . . 1908--1918
              Zhenzhe Zheng and   
                     Fan Wu and   
               Shaojie Tang and   
                    Guihai Chen   AEGIS: an unknown combinatorial auction
                                  mechanism framework for heterogeneous
                                  spectrum redistribution in
                                  noncooperative wireless networks . . . . 1919--1932

IEEE\slash ACM Transactions on Networking
Volume 24, Number 4, August, 2016

         Hamlet Medina Ruiz and   
             Michel Kieffer and   
       Beatrice Pesquet-Popescu   TCP and Network Coding: Equilibrium and
                                  Dynamic Properties . . . . . . . . . . . 1935--1947
                 Zhidan Liu and   
               Zhenjiang Li and   
                      Mo Li and   
                   Wei Xing and   
                    Dongming Lu   Path Reconstruction in Dynamic Wireless
                                  Sensor Networks Using Compressive
                                  Sensing  . . . . . . . . . . . . . . . . 1948--1960
               Gaurav Raina and   
      Sreelakshmi Manjunath and   
                 Sai Prasad and   
         Krishnamurthy Giridhar   Stability and Performance Analysis of
                                  Compound TCP With REM and Drop-Tail
                                  Queue Management . . . . . . . . . . . . 1961--1974
               Jianxia Ning and   
           Shailendra Singh and   
   Konstantinos Pelechrinis and   
                    Bin Liu and   
  Srikanth V. Krishnamurthy and   
                Ramesh Govindan   Forensic Analysis of Packet Losses in
                                  Wireless Networks  . . . . . . . . . . . 1975--1988
                     Yi Qin and   
                 Riheng Jia and   
               Jinbei Zhang and   
                  Weijie Wu and   
                   Xinbing Wang   Impact of Social Relation and Group Size
                                  in Multicast Ad Hoc Networks . . . . . . 1989--2004
     Ahmed Osama Fathy Atya and   
           Ioannis Broustis and   
           Shailendra Singh and   
         Dimitris Syrivelis and   
  Srikanth V. Krishnamurthy and   
             Thomas F. La Porta   A Policy-Aware Enforcement Logic for
                                  Appropriately Invoking Network Coding    2005--2018
            Pooja Vyavahare and   
               Nutan Limaye and   
                   D. Manjunath   Optimal Embedding of Functions for
                                  In-Network Computation: Complexity
                                  Analysis and Algorithms  . . . . . . . . 2019--2032
         Prasanna Chaporkar and   
           Stefan Magureanu and   
            Alexandre Proutiere   Optimal Distributed Scheduling in
                                  Wireless Networks Under the SINR
                                  Interference Model . . . . . . . . . . . 2033--2045
        Mihalis G. Markakis and   
              Eytan Modiano and   
             John N. Tsitsiklis   Delay Stability of Back-Pressure
                                  Policies in the Presence of Heavy-Tailed
                                  Traffic  . . . . . . . . . . . . . . . . 2046--2059
                 Weijie Shi and   
              Linquan Zhang and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   An Online Auction Framework for Dynamic
                                  Resource Provisioning in Cloud Computing 2060--2073
               Reuven Cohen and   
                   Gabi Nakibly   Restorable Logical Topology in the Face
                                  of No or Partial Traffic Demand
                                  Knowledge  . . . . . . . . . . . . . . . 2074--2085
            Jeffrey Wildman and   
                   Steven Weber   On Characterizing the Local Pooling
                                  Factor of Greedy Maximal Scheduling in
                                  Random Graphs  . . . . . . . . . . . . . 2086--2099
                  Chen Qian and   
                   Simon S. Lam   Greedy Routing by Network Distance
                                  Embedding  . . . . . . . . . . . . . . . 2100--2113
            David Applegate and   
               Aaron Archer and   
       Vijay Gopalakrishnan and   
              Seungjoon Lee and   
             K. K. Ramakrishnan   Optimal Content Placement for a
                                  Large-Scale VoD System . . . . . . . . . 2114--2127
               Xiaofei Liao and   
                     Li Lin and   
                  Guang Tan and   
                    Hai Jin and   
               Xiaobin Yang and   
                  Wei Zhang and   
                          Bo Li   LiveRender: a Cloud Gaming System Based
                                  on Compressed Graphics Streaming . . . . 2128--2139
               Bassel Saleh and   
                     Dongyu Qiu   Performance Analysis of
                                  Network-Coding-Based P2P Live Streaming
                                  Systems  . . . . . . . . . . . . . . . . 2140--2153
                Luwei Cheng and   
              Francis C. M. Lau   Revisiting TCP Congestion Control in a
                                  Virtual Cluster Environment  . . . . . . 2154--2167
             Guanfeng Liang and   
                  Ulas C. Kozat   On Throughput-Delay Optimal Access to
                                  Storage Clouds via Load Adaptive Coding
                                  and Chunking . . . . . . . . . . . . . . 2168--2181
                     Anh Le and   
         Athina Markopoulou and   
          Alexandros G. Dimakis   Auditing for Distributed Storage Systems 2182--2195
                Zain Shamsi and   
             Ankur Nandwani and   
              Derek Leonard and   
                Dmitri Loguinov   Hershel: Single-Packet OS Fingerprinting 2196--2209
                  Yang Peng and   
                   Kai Chen and   
                Guohui Wang and   
                    Wei Bai and   
              Yangming Zhao and   
                   Hao Wang and   
                Yanhui Geng and   
                Zhiqiang Ma and   
                         Lin Gu   Towards Comprehensive Traffic
                                  Forecasting in Cloud Computing: Design
                                  and Application  . . . . . . . . . . . . 2210--2222
               Michael J. Neely   Energy-Aware Wireless Scheduling With
                                  Near-Optimal Backlog and Convergence
                                  Time Tradeoffs . . . . . . . . . . . . . 2223--2236
               Longbo Huang and   
             Shaoquan Zhang and   
               Minghua Chen and   
                        Xin Liu   When Backpressure Meets Predictive
                                  Scheduling . . . . . . . . . . . . . . . 2237--2250
             Joachim Fabini and   
                    Tanja Zseby   The Right Time: Reducing Effective
                                  End-to-End Delay in Time-Slotted
                                  Packet-Switched Networks . . . . . . . . 2251--2263
                Xiaohan Wei and   
               Michael J. Neely   Power-Aware Wireless File Downloading: a
                                  Lyapunov Indexing Approach to a
                                  Constrained Restless Bandit Problem  . . 2264--2277
               Jaewook Kwak and   
                Chul-Ho Lee and   
                   Do Young Eun   A High-Order Markov-Chain-Based
                                  Scheduling Algorithm for Low Delay in
                                  CSMA Networks  . . . . . . . . . . . . . 2278--2290
              Mehdi Nikkhah and   
                    Roch Guerin   Migrating the Internet to IPv6: an
                                  Exploration of the When and Why  . . . . 2291--2304
                     Rui Li and   
                Alex X. Liu and   
                Ann L. Wang and   
          Bezawada Bruhadeshwar   Fast and Scalable Range Query Processing
                                  With Strong Privacy Protection for Cloud
                                  Computing  . . . . . . . . . . . . . . . 2305--2318
              Joongheon Kim and   
             Giuseppe Caire and   
             Andreas F. Molisch   Quality-Aware Streaming and Scheduling
                                  for Device-to-Device Video Delivery  . . 2319--2331
   Mohammad Javad Hajikhani and   
                Thomas Kunz and   
                Howard Schwartz   A Recursive Method for Clock
                                  Synchronization in Asymmetric
                                  Packet-Based Networks  . . . . . . . . . 2332--2342
          Cheng-Shang Chang and   
               Wanjiun Liao and   
                  Tsung-Ying Wu   Tight Lower Bounds for Channel Hopping
                                  Schemes in Cognitive Radio Networks  . . 2343--2356
               John Tadrous and   
            Atilla Eryilmaz and   
                Hesham El Gamal   Joint Smart Pricing and Proactive
                                  Content Caching for Mobile Services  . . 2357--2371
                   Wei Dong and   
                     Jie Yu and   
               Jiliang Wang and   
              Xuefeng Zhang and   
                     Yi Gao and   
                  Chun Chen and   
                      Jiajun Bu   Accurate and Robust Time Reconstruction
                                  for Deployed Sensor Networks . . . . . . 2372--2385
                Guibin Tian and   
                       Yong Liu   Towards Agile and Smooth Video
                                  Adaptation in HTTP Adaptive Streaming    2386--2399
                Alex X. Liu and   
                     Eric Torng   Overlay Automata and Algorithms for Fast
                                  and Scalable Regular Expression Matching 2400--2415
             Jaeseong Jeong and   
                    Yung Yi and   
              Jeong-Woo Cho and   
               Do Young Eun and   
                     Song Chong   Energy-Efficient Wi-Fi Sensing Policy
                                  Under Generalized Mobility Patterns With
                                  Aging  . . . . . . . . . . . . . . . . . 2416--2428
        Gianfranco Nencioni and   
            Nishanth Sastry and   
               Gareth Tyson and   
       Vijay Badrinarayanan and   
           Dmytro Karamshuk and   
            Jigna Chandaria and   
                  Jon Crowcroft   SCORE: Exploiting Global Broadcasts to
                                  Create Offline Personal Channels for
                                  On-Demand Access . . . . . . . . . . . . 2429--2442
                   Yu Xiang and   
                   Tian Lan and   
            Vaneet Aggarwal and   
               Yih-Farn R. Chen   Joint Latency and Cost Optimization for
                                  Erasure-Coded Data Center Storage  . . . 2443--2457
         Srikanth Hariharan and   
                 Ness B. Shroff   On Sample-Path Optimal Dynamic
                                  Scheduling for Sum-Queue Minimization in
                                  Trees Under the $K$-Hop Interference
                                  Model  . . . . . . . . . . . . . . . . . 2458--2471
                  Chen Wang and   
               Hongbo Jiang and   
                Tianlong Yu and   
                 John C. S. Lui   SLICE: Enabling Greedy Routing in High
                                  Genus $3$-D WSNs With General Topologies 2472--2484
                   Wei Dong and   
           Swati Rallapalli and   
                   Lili Qiu and   
         K. K. Ramakrishnan and   
                      Yin Zhang   Double Auctions for Dynamic Spectrum
                                  Allocation . . . . . . . . . . . . . . . 2485--2497
                     Wan Du and   
               Zhenjiang Li and   
    Jansen Christian Liando and   
                          Mo Li   From Rateless to Distanceless: Enabling
                                  Sparse Sensor Network Deployment in
                                  Large Areas  . . . . . . . . . . . . . . 2498--2511
        Felix Ming Fai Wong and   
               Zhenming Liu and   
                    Mung Chiang   On the Efficiency of Social Recommender
                                  Networks . . . . . . . . . . . . . . . . 2512--2524
              Lidia Donvito and   
            Laura Galluccio and   
             Alfio Lombardo and   
               Giacomo Morabito   $ \mu $-NET: a Network for Molecular
                                  Biology Applications in Microfluidic
                                  Chips  . . . . . . . . . . . . . . . . . 2525--2538
             Mehdi Malboubi and   
                   Cuong Vu and   
             Chen-Nee Chuah and   
                  Puneet Sharma   Decentralizing Network Inference
                                  Problems With Multiple-Description
                                  Fusion Estimation MDFE . . . . . . . . . 2539--2552
               Tobias Harks and   
              Martin Hoefer and   
             Kevin Schewior and   
             Alexander Skopalik   Routing Games With Progressive Filling   2553--2562
               Richard T. B. Ma   Subsidization Competition: Vitalizing
                                  the Neutral Internet . . . . . . . . . . 2563--2576

IEEE\slash ACM Transactions on Networking
Volume 24, Number 5, October, 2016

                  Huasen Wu and   
                Xiaojun Lin and   
                    Xin Liu and   
                    Kun Tan and   
                Yongguang Zhang   CoSchd: Coordinated Scheduling With
                                  Channel and Load Awareness for
                                  Alleviating Cellular Congestion  . . . . 2579--2592
                     Di Niu and   
                 Baochun Li and   
                     Di Niu and   
                     Baochun Li   An Asynchronous Fixed-Point Algorithm
                                  for Resource Sharing With Coupled
                                  Objectives . . . . . . . . . . . . . . . 2593--2606
                   Can Zhao and   
                  Jian Zhao and   
                Xiaojun Lin and   
                       Chuan Wu   Capacity of P2P On-Demand Streaming With
                                  Simple, Robust, and Decentralized
                                  Control  . . . . . . . . . . . . . . . . 2607--2620
          Luis Amaral Lopes and   
                 Rute Sofia and   
               Huseyin Haci and   
                    Huiling Zhu   A Proposal for Dynamic Frequency Sharing
                                  in Wireless Networks . . . . . . . . . . 2621--2633
            Karla Kvaternik and   
               Jaime Llorca and   
              Daniel Kilper and   
                    Lacra Pavel   A Methodology for the Design of
                                  Self-Optimizing, Decentralized
                                  Content-Caching Strategies . . . . . . . 2634--2647
          Shravan Garlapati and   
             Teja Kuruganti and   
         Michael R. Buehrer and   
            Jeffrey H. Reed and   
          Shravan Garlapati and   
             Teja Kuruganti and   
         Michael R. Buehrer and   
                Jeffrey H. Reed   SMAC: a Soft MAC to Reduce Control
                                  Overhead and Latency in CDMA-Based AMI
                                  Networks . . . . . . . . . . . . . . . . 2648--2662
        Angelos Chatzipapas and   
               Vincenzo Mancuso   An M/G/1 Model for Gigabit Energy
                                  Efficient Ethernet Links With Coalescing
                                  and Real-Trace-Based Evaluation  . . . . 2663--2675
               Victor Valls and   
               Douglas J. Leith   Max-Weight Revisited: Sequences of
                                  Nonconvex Optimizations Solving Convex
                                  Optimizations  . . . . . . . . . . . . . 2676--2689
                    Bei Liu and   
                   Wei Wang and   
               Donghyun Kim and   
                  Deying Li and   
                Jingyi Wang and   
            Alade O. Tokuta and   
                   Yaolin Jiang   On Approximating Minimum $3$-Connected
                                  $m$-Dominating Set Problem in Unit Disk
                                  Graph  . . . . . . . . . . . . . . . . . 2690--2701
                 Yuxiao Hou and   
                  Jiajue Ou and   
             Yuanqing Zheng and   
                          Mo Li   PLACE: Physical Layer Cardinality
                                  Estimation for Large-Scale RFID Systems  2702--2714
               John Tadrous and   
                Atilla Eryilmaz   On Optimal Proactive Caching for Mobile
                                  Networks With Demand Uncertainties . . . 2715--2727
            Matteo Varvello and   
              Rafael Laufer and   
             Feixiong Zhang and   
                 T. V. Lakshman   Multilayer Packet Classification With
                                  Graphics Processing Units  . . . . . . . 2728--2741
                   Sen Wang and   
                     Jun Bi and   
                Jianping Wu and   
        Athanasios V. Vasilakos   CPHR: In-Network Caching for
                                  Information-Centric Networking With
                                  Partitioning and Hash-Routing  . . . . . 2742--2755
                   Wei Gong and   
               Haoxiang Liu and   
                   Lei Chen and   
                  Kebin Liu and   
                     Yunhao Liu   Fast Composite Counting in RFID Systems  2756--2767
                 Shuihai Hu and   
                   Kai Chen and   
                  Haitao Wu and   
                    Wei Bai and   
                  Chang Lan and   
                   Hao Wang and   
                Hongze Zhao and   
                 Chuanxiong Guo   Explicit Path Control in Commodity Data
                                  Centers: Design and Applications . . . . 2768--2781
                Guodong Shi and   
                      Bo Li and   
           Mikael Johansson and   
          Karl Henrik Johansson   Finite-Time Convergent Gossiping . . . . 2782--2794
                    Xu Chen and   
                   Lei Jiao and   
                Wenzhong Li and   
                    Xiaoming Fu   Efficient Multi-User Computation
                                  Offloading for Mobile-Edge Cloud
                                  Computing  . . . . . . . . . . . . . . . 2795--2808
              Johannes Dams and   
              Martin Hoefer and   
              Thomas Kesselheim   Jamming-Resistant Learning in Wireless
                                  Networks . . . . . . . . . . . . . . . . 2809--2818
             Mingyang Zhang and   
             Changsheng You and   
                     Zuqing Zhu   On the Parallelization of Spectrum
                                  Defragmentation Reconfigurations in
                                  Elastic Optical Networks . . . . . . . . 2819--2833
               Jinxue Zhang and   
                  Rui Zhang and   
               Jingchao Sun and   
              Yanchao Zhang and   
                  Chi Zhang and   
               Jinxue Zhang and   
                  Rui Zhang and   
               Jingchao Sun and   
              Yanchao Zhang and   
                      Chi Zhang   TrueTop: a Sybil-Resilient System for
                                  User Influence Measurement on Twitter    2834--2846
                Donggyu Yun and   
              Dongmyung Lee and   
               Se-Young Yun and   
                Jinwoo Shin and   
                        Yung Yi   Delay Optimal CSMA With Linear Virtual
                                  Channels Under a General Topology  . . . 2847--2857
                Xiaoyong Li and   
          Daren B. H. Cline and   
                Dmitri Loguinov   On Sample-Path Staleness in Lazy Data
                                  Replication  . . . . . . . . . . . . . . 2858--2871
              Stepan Kucera and   
              David Lopez-Perez   Inter-Cell Interference Coordination for
                                  Control Channels in LTE Heterogeneous
                                  Networks . . . . . . . . . . . . . . . . 2872--2884
                Jinsong Han and   
                   Han Ding and   
                  Chen Qian and   
                     Wei Xi and   
                   Zhi Wang and   
              Zhiping Jiang and   
          Longfei Shangguan and   
               Jizhong Zhao and   
                Jinsong Han and   
                   Han Ding and   
                  Chen Qian and   
                     Wei Xi and   
                   Zhi Wang and   
              Zhiping Jiang and   
          Longfei Shangguan and   
                   Jizhong Zhao   CBID: a Customer Behavior Identification
                                  System Using Passive Tags  . . . . . . . 2885--2898
              Ulas C. Kozat and   
             Guanfeng Liang and   
               Koray Kokten and   
                 Janos Tapolcai   On Optimal Topology Verification and
                                  Failure Localization for Software
                                  Defined Networks . . . . . . . . . . . . 2899--2912
                     Dan Li and   
                  Yirong Yu and   
                Junxiao Shi and   
                 Beichuan Zhang   PALS: Saving Network Power With Low
                                  Overhead to ISPs and Applications  . . . 2913--2925
                 Xiang Wang and   
                  Weiqi Shi and   
                 Yang Xiang and   
                         Jun Li   Efficient Network Security Policy
                                  Enforcement With Policy Space Analysis   2926--2938
           Sonia A. Bhaskar and   
               Sonia A. Bhaskar   Localization From Connectivity: a
                                  $1$-bit Maximum Likelihood Approach  . . 2939--2953
        Arpan Chattopadhyay and   
         Marceau Coupechoux and   
                   Anurag Kumar   Sequential Decision Algorithms for
                                  Measurement-Based Impromptu Deployment
                                  of a Wireless Relay Network Along a Line 2954--2968
                  Yang Song and   
         Arun Venkataramani and   
                      Lixin Gao   Identifying and Addressing Reachability
                                  and Policy Attacks in ``Secure'' BGP . . 2969--2982
                     Anh Le and   
             Lorenzo Keller and   
            Hulya Seferoglu and   
                Blerim Cici and   
         Christina Fragouli and   
             Athina Markopoulou   MicroCast: Cooperative Video Streaming
                                  Using Cellular and Local Connections . . 2983--2999
               Se-Young Yun and   
                Jinwoo Shin and   
                        Yung Yi   Distributed Medium Access Over
                                  Time-Varying Channels  . . . . . . . . . 3000--3013
         Theodore Elhourani and   
            Abishek Gopalan and   
 Srinivasan Ramasubramanian and   
         Theodore Elhourani and   
            Abishek Gopalan and   
     Srinivasan Ramasubramanian   IP Fast Rerouting for Multi-Link
                                  Failures . . . . . . . . . . . . . . . . 3014--3025
               Nirmalya Roy and   
               Archan Misra and   
               Sajal K. Das and   
               Christine Julien   Determining Quality- and Energy-Aware
                                  Multiple Contexts in Pervasive Computing
                                  Environments . . . . . . . . . . . . . . 3026--3042
        Georgios S. Paschos and   
               Chih-Ping Li and   
              Eytan Modiano and   
             Kostas Choumas and   
               Thanasis Korakis   In-Network Congestion Control for
                                  Multirate Multicast  . . . . . . . . . . 3043--3055
          Salim El Rouayheb and   
        Sreechakra Goparaju and   
               Han Mao Kiah and   
              Olgica Milenkovic   Synchronization and Deduplication in
                                  Coded Distributed Storage Networks . . . 3056--3069
                 Reaz Ahmed and   
                Faizul Bari and   
  Shihabur Rahman Chowdhury and   
              Golam Rabbani and   
              Raouf Boutaba and   
           Bertrand Mathieu and   
                 Reaz Ahmed and   
                Faizul Bari and   
  Shihabur Rahman Chowdhury and   
              Golam Rabbani and   
              Raouf Boutaba and   
               Bertrand Mathieu   $ \alpha $Route: Routing on Names  . . . 3070--3083
               Richard T. B. Ma   Usage-Based Pricing and Competition in
                                  Congestible Network Service Markets  . . 3084--3097
             Yuanqing Zheng and   
                      Mo Li and   
             Yuanqing Zheng and   
                          Mo Li   Read Bulk Data From Computational RFIDs  3098--3108
               Zhangyu Guan and   
        G. Enrico Santagati and   
                Tommaso Melodia   Distributed Algorithms for Joint Channel
                                  Access and Rate Control in Ultrasonic
                                  Intra-Body Networks  . . . . . . . . . . 3109--3122
                   Lin Chen and   
                   Wei Wang and   
                  Hua Huang and   
                   Shan Lin and   
                   Lin Chen and   
                   Wei Wang and   
                  Hua Huang and   
                       Shan Lin   On Time-Constrained Data Harvesting in
                                  Wireless Sensor Networks: Approximation
                                  Algorithm Design . . . . . . . . . . . . 3123--3135
                 Virag Shah and   
         Gustavo de Veciana and   
                 George Kesidis   A Stable Approach for Routing Queries in
                                  Unstructured P2P Networks  . . . . . . . 3136--3147
                   Lin Chen and   
                Kaigui Bian and   
                     Meng Zheng   Never Live Without Neighbors: From
                                  Single- to Multi-Channel Neighbor
                                  Discovery for Mobile Sensing
                                  Applications . . . . . . . . . . . . . . 3148--3161
                     Yi Xie and   
                    Yu Wang and   
                  Haitao He and   
                 Yang Xiang and   
               Shunzheng Yu and   
                   Xincheng Liu   A General Collaborative Framework for
                                  Modeling and Perceiving Distributed
                                  Network Behavior . . . . . . . . . . . . 3162--3176
                    Jia Liu and   
                   Min Chen and   
                   Bin Xiao and   
                   Feng Zhu and   
               Shigang Chen and   
                     Lijun Chen   Efficient RFID Grouping Protocols  . . . 3177--3190
               DaeHun Nyang and   
                    DongOh Shin   Recyclable Counter With Confinement for
                                  Real-Time Per-Flow Measurement . . . . . 3191--3203
            Kundan Kandhway and   
                       Joy Kuri   Optimal Resource Allocation Over Time
                                  and Degree Classes for Maximizing
                                  Information Dissemination in Social
                                  Networks . . . . . . . . . . . . . . . . 3204--3217
                Sara Ayoubi and   
                Yiheng Chen and   
                     Chadi Assi   Towards Promoting Backup-Sharing in
                                  Survivable Virtual Network Design  . . . 3218--3231
              Huiyuan Zhang and   
             Dung T. Nguyen and   
                  Soham Das and   
              Huiling Zhang and   
                     My T. Thai   Corrections to ``Least Cost Influence
                                  Maximization Across Multiple Social
                                  Networks'' [Apr 16 929--939] . . . . . . 3232--3232

IEEE\slash ACM Transactions on Networking
Volume 24, Number 6, December, 2016

                   Wei Wang and   
                     Qian Zhang   Privacy Preservation for Context Sensing
                                  on Smartphone  . . . . . . . . . . . . . 3235--3247
             Benjamin Baron and   
          Promethee Spathis and   
               Herve Rivano and   
         Marcelo Dias de Amorim   Offloading Massive Data Onto Passenger
                                  Vehicles: Topology Simplification and
                                  Traffic Assignment . . . . . . . . . . . 3248--3261
                Yehuda Afek and   
          Anat Bremler-Barr and   
              Yotam Harchol and   
                  David Hay and   
                    Yaron Koral   Making DPI Engines Resilient to
                                  Algorithmic Complexity Attacks . . . . . 3262--3275
                Xinlei Wang and   
                 Amit Pande and   
                 Jindan Zhu and   
              Prasant Mohapatra   STAMP: Enabling Privacy-Preserving
                                  Location Proofs for Mobile Users . . . . 3276--3289
                   Le Zhang and   
                Shahrokh Valaee   Congestion Control for Vehicular
                                  Networks With Safety-Awareness . . . . . 3290--3299
                Wenping Liu and   
              Tianping Deng and   
                       Yang and   
               Hongbo Jiang and   
               Xiaofei Liao and   
             Jiangchuan Liu and   
                      Bo Li and   
                   Guoyin Jiang   Towards Robust Surface Skeleton
                                  Extraction and Its Applications in $3$D
                                  Wireless Sensor Networks . . . . . . . . 3300--3313
                   Wei Gong and   
               Haoxiang Liu and   
                   Xin Miao and   
                  Kebin Liu and   
                   Wenbo He and   
                  Lan Zhang and   
                     Yunhao Liu   Fast and Adaptive Continuous Scanning in
                                  Large-Scale RFID Systems . . . . . . . . 3314--3325
                   Yan Qiao and   
               Shigang Chen and   
                    Zhen Mo and   
                 Myungkeun Yoon   When Bloom Filters Are No Longer
                                  Compact: Multi-Set Membership Lookup for
                                  Network Applications . . . . . . . . . . 3326--3339
                Huazi Zhang and   
                 Kairan Sun and   
              Qiuyuan Huang and   
               Yonggang Wen and   
                      Dapeng Wu   FUN Coding: Design and Analysis  . . . . 3340--3353
           Pavlos Sermpezis and   
       Thrasyvoulos Spyropoulos   Effects of Content Popularity on the
                                  Performance of Content-Centric
                                  Opportunistic Networking: an Analytical
                                  Approach and Applications  . . . . . . . 3354--3368
              Endadul Hoque and   
               Hyojeong Lee and   
            Rahul Potharaju and   
            Charles Killian and   
           Cristina Nita-Rotaru   Automated Adversarial Testing of
                                  Unmodified Wireless Routing
                                  Implementations  . . . . . . . . . . . . 3369--3382
                Osman Yagan and   
             Armand M. Makowski   Wireless Sensor Networks Under the
                                  Random Pairwise Key Predistribution
                                  Scheme: Can Resiliency Be Achieved With
                                  Small Key Rings? . . . . . . . . . . . . 3383--3396
             Dongmyoung Kim and   
                Taejun Park and   
               Seongwon Kim and   
                  Hyoil Kim and   
                  Sunghyun Choi   Load Balancing in Two-Tier Cellular
                                  Networks With Open and Hybrid Access
                                  Femtocells . . . . . . . . . . . . . . . 3397--3411
                Tal Mizrahi and   
                   Efi Saat and   
                    Yoram Moses   Timed Consistent Network Updates in
                                  Software-Defined Networks  . . . . . . . 3412--3425
               Jiliang Wang and   
                  Shuo Lian and   
                   Wei Dong and   
              Xiang-Yang Li and   
                     Yunhao Liu   Every Packet Counts: Loss and Reordering
                                  Identification and Its Application in
                                  Delay Measurement  . . . . . . . . . . . 3426--3438
                Wenping Liu and   
               Hongbo Jiang and   
             Jiangchuan Liu and   
               Xiaofei Liao and   
                Hongzhi Lin and   
                  Tianping Deng   On the Distance-Sensitive and
                                  Load-Balanced Information Storage and
                                  Retrieval for $3$D Sensor Networks . . . 3439--3449
               Bong-Hwan Oh and   
                    Jaiyong Lee   Feedback-Based Path Failure Detection
                                  and Buffer Blocking Protection for MPTCP 3450--3461
         Joao Luis Sobrinho and   
           Laurent Vanbever and   
                  Franck Le and   
                Andre Sousa and   
               Jennifer Rexford   Scaling the Internet Routing System
                                  Through Distributed Route Aggregation    3462--3476
           Muhammad Shahzad and   
                    Alex X. Liu   Accurate and Efficient Per-Flow Latency
                                  Measurement Without Probing and Time
                                  Stamping . . . . . . . . . . . . . . . . 3477--3492
               Gideon Blocq and   
                     Ariel Orda   How Good is Bargained Routing? . . . . . 3493--3507
                    Xin Sun and   
                Geoffrey G. Xie   An Integrated Systematic Approach to
                                  Designing Enterprise Access Control  . . 3508--3522
                Shouling Ji and   
                 Weiqing Li and   
          Mudhakar Srivatsa and   
                   Raheem Beyah   Structural Data De-Anonymization: Theory
                                  and Practice . . . . . . . . . . . . . . 3523--3536
                   Ming Zhu and   
                     Dan Li and   
               Fangxin Wang and   
                    Anke Li and   
         K. K. Ramakrishnan and   
                   Ying Liu and   
                Jianping Wu and   
                    Nan Zhu and   
                        Xue Liu   CCDN: Content-Centric Data Center
                                  Networks . . . . . . . . . . . . . . . . 3537--3550
                   Saiyu Qi and   
             Yuanqing Zheng and   
                      Mo Li and   
                 Yunhao Liu and   
                      Jinli Qiu   Scalable Industry Data Access Control in
                                  RFID-Enabled Supply Chain  . . . . . . . 3551--3564
                    Bing Hu and   
              Kwan L. Yeung and   
                  Qian Zhou and   
                     Chunzhi He   On Iterative Scheduling for Input-Queued
                                  Switches With a Speedup of $ 2 - 1 / N $ 3565--3577
          Emile Archambault and   
              Nabih Alloune and   
              Marija Furdek and   
                  Zhenyu Xu and   
         Christine Tremblay and   
             Ajmal Muhammad and   
                Jiajia Chen and   
              Lena Wosinska and   
            Paul Littlewood and   
             Michel P. Belanger   Routing and Spectrum Assignment in
                                  Elastic Filterless Optical Networks  . . 3578--3592
                    Xu Chen and   
               Xiaowen Gong and   
                   Lei Yang and   
                  Junshan Zhang   Exploiting Social Tie Structure for
                                  Cooperative Wireless Networking: a
                                  Social Group Utility Maximization
                                  Framework  . . . . . . . . . . . . . . . 3593--3606
                  Qing Wang and   
           Domenico Giustiniano   Intra-Frame Bidirectional Transmission
                                  in Networks of Visible LEDs  . . . . . . 3607--3619
                 Zhao Zhang and   
              James Willson and   
                  Zaixin Lu and   
                   Weili Wu and   
                 Xuding Zhu and   
                    Ding-Zhu Du   Approximating Maximum Lifetime
                                  $k$-Coverage Through Minimizing Weighted
                                  $k$-Cover in Homogeneous Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 3620--3633
                      Di Wu and   
                  Qiang Liu and   
                    Yong Li and   
            Julie A. McCann and   
            Amelia C. Regan and   
      Nalini Venkatasubramanian   Adaptive Lookup of Open WiFi Using
                                  Crowdsensing . . . . . . . . . . . . . . 3634--3647
                  Long Gong and   
               Huihui Jiang and   
               Yixiang Wang and   
                     Zuqing Zhu   Novel Location-Constrained Virtual
                                  Network Embedding LC-VNE Algorithms
                                  Towards Integrated Node and Link Mapping 3648--3661
                  Simon Oya and   
    Fernando Perez-Gonzalez and   
               Carmela Troncoso   Design of Pool Mixes Against Profiling
                                  Attacks in Real Conditions . . . . . . . 3662--3675
                 Long Cheng and   
                Jianwei Niu and   
                      Yu Gu and   
               Chengwen Luo and   
                        Tian He   Achieving Efficient Reliable Flooding in
                                  Low-Duty-Cycle Wireless Sensor Networks  3676--3689
         Valentino Pacifici and   
                     Gyorgy Dan   Coordinated Selfish Distributed Caching
                                  for Peering Content-Centric Networks . . 3690--3701
             Agostinho Agra and   
             Amaro de Sousa and   
           Mahdi Doostmohammadi   The Minimum Cost Design of Transparent
                                  Optical Networks Combining Grooming,
                                  Routing, and Wavelength Assignment . . . 3702--3713
               Chi-Kin Chau and   
               Majid Khonji and   
                 Muhammad Aftab   Online Algorithms for Information
                                  Aggregation From Distributed and
                                  Correlated Sources . . . . . . . . . . . 3714--3725
      Victor Berrocal-Plaza and   
   Miguel A. Vega-Rodriguez and   
          Juan M. Sanchez-Perez   An Efficient Way of Assigning Paging
                                  Areas by Using Mobility Models . . . . . 3726--3739
                 Zhenhua Li and   
                Zhiyang Guo and   
                  Yuanyuan Yang   BCCC: an Expandable Network for Data
                                  Centers  . . . . . . . . . . . . . . . . 3740--3755
  Carla-Fabiana Chiasserini and   
            Michele Garetto and   
                Emilio Leonardi   Social Network De-Anonymization Under
                                  Scale-Free User Relations  . . . . . . . 3756--3769
           Muhammad Shahzad and   
                    Alex X. Liu   Fast and Reliable Detection and
                                  Identification of Missing RFID Tags in
                                  the Wild . . . . . . . . . . . . . . . . 3770--3784
               Wan-Seon Lim and   
                   Kang G. Shin   POEM: Minimizing Energy Consumption for
                                  WiFi Tethering Service . . . . . . . . . 3785--3797
                Jungseul Ok and   
                Youngmi Jin and   
                Jinwoo Shin and   
                        Yung Yi   On Maximizing Diffusion Speed Over
                                  Social Networks With Strategic Users . . 3798--3811
          Maialen Larrnaaga and   
               Urtzi Ayesta and   
              Ina Maria Verloop   Dynamic Control of Birth-and-Death
                                  Restless Bandits: Application to
                                  Resource-Allocation Problems . . . . . . 3812--3825
                Varun Gupta and   
             Yigal Bejerano and   
            Craig Gutterman and   
             Jaime Ferragut and   
              Katherine Guo and   
          Thyaga Nandagopal and   
                    Gil Zussman   Light-Weight Feedback Mechanism for WiFi
                                  Multicast to Very Large Groups ---
                                  Experimental Evaluation  . . . . . . . . 3826--3840
                     Li Yan and   
               Haiying Shen and   
                      Kang Chen   TSearch: Target-Oriented Low-Delay Node
                                  Searching in DTNs With Social Network
                                  Properties . . . . . . . . . . . . . . . 3841--3855
               Tiantian Zhu and   
                 Hongyu Gao and   
                    Yi Yang and   
                     Kai Bu and   
                   Yan Chen and   
                Doug Downey and   
                  Kathy Lee and   
              Alok N. Choudhary   Beating the Artificial Chaos: Fighting
                                  OSN Spam Using Its Own Templates . . . . 3856--3869


IEEE\slash ACM Transactions on Networking
Volume 25, Number 1, February, 2017

                    Jian Li and   
     Rajarshi Bhattacharyya and   
                 Suman Paul and   
        Srinivas Shakkottai and   
              Vijay Subramanian   Incentivizing Sharing in Realtime D2D
                                  Streaming Networks: a Mean Field Game
                                  Perspective  . . . . . . . . . . . . . . 3--17
                   Wei Wang and   
                    Bei Liu and   
               Donghyun Kim and   
                  Deying Li and   
                Jingyi Wang and   
                        Wei Gao   A New Constant Factor Approximation to
                                  Construct Highly Fault-Tolerant
                                  Connected Dominating Set in Unit Disk
                                  Graph  . . . . . . . . . . . . . . . . . 18--28
                   Longbo Huang   The Value-of-Information in Matching
                                  With Queues  . . . . . . . . . . . . . . 29--42
                    Zhuo Lu and   
                     Cliff Wang   Enabling Network Anti-Inference via
                                  Proactive Strategies: a Fundamental
                                  Perspective  . . . . . . . . . . . . . . 43--55
               Joe Kornycky and   
          Omar Abdul-Hameed and   
               Ahmet Kondoz and   
                Brian C. Barber   Radio Frequency Traffic Classification
                                  Over WLAN  . . . . . . . . . . . . . . . 56--68
               Zhenjiang Li and   
                     Wan Du and   
             Yuanqing Zheng and   
                      Mo Li and   
                      Dapeng Wu   From Rateless to Hopless . . . . . . . . 69--82
           Mays F. Al-Naday and   
            Nikolaos Thomos and   
                 Martin J. Reed   Information-Centric Multilayer
                                  Networking: Improving Performance
                                  Through an ICN/WDM Architecture  . . . . 83--97
           Ashwin Pananjady and   
        Vivek Kumar Bagaria and   
                     Rahul Vaze   Optimally Approximating the Coverage
                                  Lifetime of Wireless Sensor Networks . . 98--111
               Guangmo Tong and   
                   Weili Wu and   
               Shaojie Tang and   
                    Ding-Zhu Du   Adaptive Influence Maximization in
                                  Dynamic Social Networks  . . . . . . . . 112--125
         Neshat Etemadi Rad and   
              Yariv Ephraim and   
                  Brian L. Mark   Delay Network Tomography Using a
                                  Partially Observable Bivariate Markov
                                  Chain  . . . . . . . . . . . . . . . . . 126--138
               Jose Yallouz and   
                     Ariel Orda   Tunable QoS-Aware Network Survivability  139--149
             Joao Luis Sobrinho   Correctness of Routing Vector Protocols
                                  as a Property of Network Cycles  . . . . 150--163
            Sharayu Moharir and   
     Subhashini Krishnasamy and   
              Sanjay Shakkottai   Scheduling in Densified Networks:
                                  Algorithms and Performance . . . . . . . 164--178
                     An Liu and   
              Vincent K. N. Lau   How Much Cache is Needed to Achieve
                                  Linear Capacity Scaling in
                                  Backhaul-Limited Dense Wireless
                                  Networks?  . . . . . . . . . . . . . . . 179--188
              Adiseshu Hari and   
                 Urs Niesen and   
                 Gordon Wilfong   On the Problem of Optimal Path Encoding
                                  for Software-Defined Networks  . . . . . 189--198
                Zizhong Cao and   
               Paul Claisse and   
        Rene-Jean Essiambre and   
            Murali Kodialam and   
                 T. V. Lakshman   Optimizing Throughput in Optical
                                  Networks: The Joint Routing and Power
                                  Control Problem  . . . . . . . . . . . . 199--209
                   Wei Dong and   
                     Yi Gao and   
                  Wenbin Wu and   
                  Jiajun Bu and   
                  Chun Chen and   
                  Xiang-Yang Li   Optimal Monitor Assignment for
                                  Preferential Link Tomography in
                                  Communication Networks . . . . . . . . . 210--223
                Xiulong Liu and   
                   Bin Xiao and   
                   Keqiu Li and   
                Alex X. Liu and   
                     Jie Wu and   
                    Xin Xie and   
                        Heng Qi   RFID Estimation With Blocker Tags  . . . 224--237
                   Fang Hao and   
            Murali Kodialam and   
             T. V. Lakshman and   
                Sarit Mukherjee   Online Allocation of Virtual Machines in
                                  a Distributed Cloud  . . . . . . . . . . 238--249
          Christina Vlachou and   
              Albert Banchs and   
              Julien Herzen and   
                 Patrick Thiran   How CSMA/CA With Deferral Affects
                                  Performance and Dynamics in Power-Line
                                  Communications . . . . . . . . . . . . . 250--263
                Xiulong Liu and   
                   Keqiu Li and   
                Alex X. Liu and   
                   Song Guo and   
           Muhammad Shahzad and   
                Ann L. Wang and   
                         Jie Wu   Multi-Category RFID Estimation . . . . . 264--277
                Xiulong Liu and   
                    Xin Xie and   
                   Keqiu Li and   
                   Bin Xiao and   
                     Jie Wu and   
                    Heng Qi and   
                       Dawei Lu   Fast Tracking the Population of Key Tags
                                  in Large-Scale Anonymous RFID Systems    278--291
           Jelena Marasevic and   
                   Jin Zhou and   
        Harish Krishnaswamy and   
                 Yuan Zhong and   
                    Gil Zussman   Resource Allocation and Rate Gains in
                                  Practical Full-Duplex Systems  . . . . . 292--305
           Rebecca Lovewell and   
                Qianwen Yin and   
             Tianrong Zhang and   
               Jasleen Kaur and   
           Frank Donelson Smith   Packet-Scale Congestion Control Paradigm 306--319
                  Ali Munir and   
               Ghufran Baig and   
       Syed Mohammad Irteza and   
           Ihsan Ayyub Qazi and   
                Alex X. Liu and   
            Fahad Rafique Dogar   PASE: Synthesizing Existing Transport
                                  Strategies for Near-Optimal Data Center
                                  Transport  . . . . . . . . . . . . . . . 320--334
              Changhyun Lee and   
              Chunjong Park and   
                  Keon Jang and   
                   Sue Moon and   
                     Dongsu Han   DX: Latency-Based Congestion Control for
                                  Datacenters  . . . . . . . . . . . . . . 335--348
           Stefano D'Aronco and   
                 Laura Toni and   
                Sergio Mena and   
               Xiaoqing Zhu and   
                Pascal Frossard   Improved Utility-Based Congestion
                                  Control for Delay-Constrained
                                  Communication  . . . . . . . . . . . . . 349--362
                Xiaoyong Li and   
          Daren B. H. Cline and   
                Dmitri Loguinov   Temporal Update Dynamics Under Blind
                                  Sampling . . . . . . . . . . . . . . . . 363--376
             Abhishek Sinha and   
           Georgios Paschos and   
               Chih-Ping Li and   
                  Eytan Modiano   Throughput-Optimal Multihop Broadcast on
                                  Directed Acyclic Wireless Networks . . . 377--391
               Qingjun Xiao and   
                   Bin Xiao and   
               Shigang Chen and   
                    Jiming Chen   Collision-Aware Churn Estimation in
                                  Large-Scale Dynamic RFID Systems . . . . 392--405
   Alireza Keshavarz-Haddad and   
              Ehsan Aryafar and   
               Michael Wang and   
                    Mung Chiang   HetNets Selection by Clients:
                                  Convergence, Efficiency, and
                                  Practicality . . . . . . . . . . . . . . 406--419
V. Sriram Siddhardh Nadendla and   
          Swastik K. Brahma and   
             Pramod K. Varshney   Optimal Spectrum Auction Design With
                                  $2$-D Truthful Revelations Under
                                  Uncertain Spectrum Availability  . . . . 420--433
                   Liang Ma and   
                    Ting He and   
            Ananthram Swami and   
                Don Towsley and   
                   Kin K. Leung   Network Capability in Localizing Node
                                  Failures via End-to-End Path
                                  Measurements . . . . . . . . . . . . . . 434--450
                Yongquan Fu and   
                    Xu Xiaoping   Self-Stabilized Distributed Network
                                  Distance Prediction  . . . . . . . . . . 451--464
              Wei-Cheng Kuo and   
                 Chih-Chun Wang   Robust and Optimal Opportunistic
                                  Scheduling for Downlink Two-Flow Network
                                  Coding With Varying Channel Quality and
                                  Rate Adaptation  . . . . . . . . . . . . 465--479
                     Yi Gao and   
                   Wei Dong and   
                  Chun Chen and   
               Xiaoyu Zhang and   
                  Jiajun Bu and   
                        Xue Liu   Accurate Per-Packet Delay Tomography in
                                  Wireless Ad Hoc Networks . . . . . . . . 480--491
        Luis Sanabria-Russo and   
              Jaume Barcelo and   
             Boris Bellalta and   
             Francesco Gringoli   A High Efficiency MAC Protocol for
                                  WLANs: Providing Fairness in Dense
                                  Scenarios  . . . . . . . . . . . . . . . 492--505
               Fangming Liu and   
                   Jian Guo and   
             Xiaomeng Huang and   
                 John C. S. Lui   eBA: Efficient Bandwidth Guarantee Under
                                  Traffic Variability in Datacenters . . . 506--519
                   Hao Zhou and   
                 Yusheng Ji and   
               Xiaoyan Wang and   
                 Shigeki Yamada   eICIC Configuration Algorithm with
                                  Service Scalability in Heterogeneous
                                  Cellular Networks  . . . . . . . . . . . 520--535
                    Xu Chen and   
               Xiaowen Gong and   
                   Lei Yang and   
                  Junshan Zhang   Amazon in the White Space: Social
                                  Recommendation Aided Distributed
                                  Spectrum Access  . . . . . . . . . . . . 536--549
              Fidan Mehmeti and   
       Thrasyvoulos Spyropoulos   Performance Modeling, Analysis, and
                                  Optimization of Delayed Mobile Data
                                  Offloading for Mobile Users  . . . . . . 550--564
             Wei Koong Chai and   
                  George Pavlou   Path-Based Epidemic Spreading in
                                  Networks . . . . . . . . . . . . . . . . 565--578
                 Hong Zhang and   
                   Kai Chen and   
                    Wei Bai and   
                 Dongsu Han and   
                  Chen Tian and   
                   Hao Wang and   
               Haibing Guan and   
                     Ming Zhang   Guaranteeing Deadlines for Inter-Data
                                  Center Transfers . . . . . . . . . . . . 579--595
          Longfei Shangguan and   
                 Zheng Yang and   
                Alex X. Liu and   
                  Zimu Zhou and   
                     Yunhao Liu   STPP: Spatial-Temporal Phase
                                  Profiling-Based Method for Relative RFID
                                  Tag Localization . . . . . . . . . . . . 596--609
         Giorgos Vasiliadis and   
          Lazaros Koromilas and   
     Michalis Polychronakis and   
              Sotiris Ioannidis   Design and Implementation of a Stateful
                                  Network Packet Processing Framework for
                                  GPUs . . . . . . . . . . . . . . . . . . 610--623
                Xiaohang Li and   
             Chih-Chun Wang and   
                    Xiaojun Lin   Inter-Session Network Coding Schemes for
                                  $1$-to-$2$ Downlink Access-Point
                                  Networks With Sequential Hard Deadline
                                  Constraints  . . . . . . . . . . . . . . 624--638

IEEE\slash ACM Transactions on Networking
Volume 25, Number 2, April, 2017

            YoungGyoun Moon and   
                Donghwi Kim and   
               Younghwan Go and   
               Yeongjin Kim and   
                    Yung Yi and   
                 Song Chong and   
                 KyoungSoo Park   Cedos: a Network Architecture and
                                  Programming Abstraction for
                                  Delay-Tolerant Mobile Apps . . . . . . . 646--661
                Qiaomin Xie and   
              Mayank Pundir and   
                      Yi Lu and   
           Cristina L. Abad and   
                Roy H. Campbell   Pandas: Robust Locality-Aware Scheduling
                                  With Stochastic Delay Optimality . . . . 662--675
                     Anh Le and   
        Arash Saber Tehrani and   
         Alexandros Dimakis and   
             Athina Markopoulou   Recovery of Packet Losses in Wireless
                                  Broadcast for Real-Time Applications . . 676--689
          Hamzeh Beyranvand and   
            Martin Levesque and   
               Martin Maier and   
            Jawad A. Salehi and   
        Christos Verikoukis and   
                   David Tipper   Toward 5G: FiWi Enhanced LTE-A HetNets
                                  With Reliable Low-Latency Fiber Backhaul
                                  Sharing and WiFi Offloading  . . . . . . 690--707
             Shaoquan Zhang and   
               Longbo Huang and   
               Minghua Chen and   
                        Xin Liu   Proactive Serving Decreases User Delay
                                  Exponentially: The Light-Tailed Service
                                  Time Case  . . . . . . . . . . . . . . . 708--723
                    Rui Zhu and   
                   Bang Liu and   
                     Di Niu and   
                Zongpeng Li and   
                Hong Vicky Zhao   Network Latency Estimation for Personal
                                  Devices: a Matrix Completion Approach    724--737
   Roland van Rijswijk-Deij and   
             Kaspar Hageman and   
              Anna Sperotto and   
                      Aiko Pras   The Performance Impact of Elliptic Curve
                                  Cryptography on DNSSEC Validation  . . . 738--750
                   Luoyi Fu and   
               Xinbing Wang and   
                    P. R. Kumar   Are We Connected? Optimal Determination
                                  of Source--Destination Connectivity in
                                  Random Networks  . . . . . . . . . . . . 751--764
                Benny Van Houdt   Explicit Back-Off Rates for Achieving
                                  Target Throughputs in CSMA/CA Networks   765--778
               Marco Chiesa and   
                Guy Kindler and   
               Michael Schapira   Traffic Engineering With
                                  Equal-Cost-MultiPath: an Algorithmic
                                  Perspective  . . . . . . . . . . . . . . 779--792
               Ruiting Zhou and   
                Zongpeng Li and   
                   Chuan Wu and   
                    Zhiyi Huang   An Efficient Cloud Market Mechanism for
                                  Computing Jobs With Soft Deadlines . . . 793--805
               Fangfang Yan and   
                Tony T. Lee and   
                    Weisheng Hu   Congestion-Aware Embedding of
                                  Heterogeneous Bandwidth Virtual Data
                                  Centers With Hose Model Abstraction  . . 806--819
                     Wan Du and   
    Jansen Christian Liando and   
               Huanle Zhang and   
                          Mo Li   Pando: Fountain-Enabled Fast Data
                                  Dissemination With Constructive
                                  Interference . . . . . . . . . . . . . . 820--833
                Ronghui Hou and   
                   Yu Cheng and   
                Jiandong Li and   
                  Min Sheng and   
                  King-Shan Lui   Capacity of Hybrid Wireless Networks
                                  With Long-Range Social Contacts Behavior 834--848
                Tal Mizrahi and   
          Ori Rottenstreich and   
                    Yoram Moses   TimeFlip: Using Timestamp-Based TCAM
                                  Ranges to Accurately Schedule Network
                                  Updates  . . . . . . . . . . . . . . . . 849--863
          Ori Rottenstreich and   
                 Janos Tapolcai   Optimal Rule Caching and Lossy
                                  Compression for Longest Prefix Matching  864--878
                    Tong Ye and   
              Jinghui Zhang and   
                Tony T. Lee and   
                    Weisheng Hu   Deflection-Compensated
                                  Birkhoff--von-Neumann Switches . . . . . 879--895
              Liansheng Tan and   
                   Shengda Tang   Energy Harvesting Wireless Sensor Node
                                  With Temporal Death: Novel Models and
                                  Analyses . . . . . . . . . . . . . . . . 896--909
           Shailendra Singh and   
     Karthikeyan Sundaresan and   
  Srikanth V. Krishnamurthy and   
                Xinyu Zhang and   
Mohammad Ali Amir Khojastepour and   
             Sampath Rangarajan   TRINITY: Tailoring Wireless Transmission
                                  Strategies to User Profiles in
                                  Enterprise Wireless Networks . . . . . . 910--924
                 Yishuo Shi and   
                 Zhao Zhang and   
                 Yuchang Mo and   
                    Ding-Zhu Du   Approximation Algorithm for Minimum
                                  Weight Fault-Tolerant Virtual Backbone
                                  in Unit Disk Graphs  . . . . . . . . . . 925--933
                  Jie Cheng and   
                 Yaning Liu and   
                   Qiang Ye and   
                 Hongwei Du and   
        Athanasios V. Vasilakos   DISCS: a Distributed Coordinate System
                                  Based on Robust Nonnegative Matrix
                                  Completion . . . . . . . . . . . . . . . 934--947
                Zhiwei Zhao and   
                   Wei Dong and   
                  Jiajun Bu and   
                     Tao Gu and   
                     Geyong Min   Accurate and Generic Sender Selection
                                  for Bulk Data Dissemination in Low-Power
                                  Wireless Networks  . . . . . . . . . . . 948--959
        G. Enrico Santagati and   
                Tommaso Melodia   A Software-Defined Ultrasonic Networking
                                  Framework for Wearable Devices . . . . . 960--973
                  Amitava Datta   Construction of Polynomial-Size Optical
                                  Priority Queues Using Linear Switches
                                  and Fiber Delay Lines  . . . . . . . . . 974--987
                   Tuan Dao and   
      Amit K. Roy-Chowdhury and   
       Harsha V. Madhyastha and   
  Srikanth V. Krishnamurthy and   
                   Tom La Porta   Managing Redundant Content in Bandwidth
                                  Constrained Wireless Networks  . . . . . 988--1003
            Lorenzo Ferrari and   
             Anna Scaglione and   
             Reinhard Gentz and   
             Yao-Win Peter Hong   Convergence Results on Pulse Coupled
                                  Oscillator Protocols in Locally
                                  Connected Networks . . . . . . . . . . . 1004--1019
             Santosh Chavan and   
           Nizar Malangadan and   
                   Gaurav Raina   TCP With Virtual Queue Management
                                  Policies: Stability and Bifurcation
                                  Analysis . . . . . . . . . . . . . . . . 1020--1033
               Xiaoxi Zhang and   
                Zhiyi Huang and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   Online Auctions in IaaS Clouds: Welfare
                                  and Profit Maximization With Server
                                  Costs  . . . . . . . . . . . . . . . . . 1034--1047
               Serdar Vural and   
                  Ning Wang and   
     Pirabakaran Navaratnam and   
                Rahim Tafazolli   Caching Transient Data in Internet
                                  Content Routers  . . . . . . . . . . . . 1048--1061
        Kianoosh Mokhtarian and   
             Hans-Arno Jacobsen   Flexible Caching Algorithms for Video
                                  Content Distribution Networks  . . . . . 1062--1075
               Bahar Partov and   
               Douglas J. Leith   Utility Fair Rate Allocation in
                                  LTE/802.11 Networks  . . . . . . . . . . 1076--1088
               Daniel Posch and   
            Benjamin Rainer and   
             Hermann Hellwagner   SAF: Stochastic Adaptive Forwarding in
                                  Named Data Networking  . . . . . . . . . 1089--1102
               Jingjing Luo and   
               Jinbei Zhang and   
                   Ying Cui and   
                      Li Yu and   
                   Xinbing Wang   Asymptotic Analysis on Content Placement
                                  and Retrieval in MANETs  . . . . . . . . 1103--1118
           Alvaro Fernandez and   
                   Norvald Stol   Economic, Dissatisfaction, and
                                  Reputation Risks of Hardware and
                                  Software Failures in PONs  . . . . . . . 1119--1132
               Marco Chiesa and   
          Ilya Nikolaevskiy and   
          Slobodan Mitrovic and   
              Andrei Gurtov and   
           Aleksander Madry and   
           Michael Schapira and   
                  Scott Shenker   On the Resiliency of Static Forwarding
                                  Tables . . . . . . . . . . . . . . . . . 1133--1146
                  Fengli Xu and   
                    Yong Li and   
              Huandong Wang and   
               Pengyu Zhang and   
                     Depeng Jin   Understanding Mobile Traffic Patterns of
                                  Large Scale Cellular Towers in Urban
                                  Environment  . . . . . . . . . . . . . . 1147--1161
            Omid Javidbakht and   
        Parv Venkitasubramaniam   Delay Anonymity Tradeoff in Mix
                                  Networks: Optimal Routing  . . . . . . . 1162--1175
                  Kang Chen and   
                   Haiying Shen   FaceChange: Attaining Neighbor Node
                                  Anonymity in Mobile Opportunistic Social
                                  Networks With Fine-Grained Control . . . 1176--1189
                Lailong Luo and   
                   Deke Guo and   
                     Jie Wu and   
          Ori Rottenstreich and   
                    Qian He and   
                 Yudong Qin and   
                    Xueshan Luo   Efficient Multiset Synchronization . . . 1190--1205
            Moreno Ambrosin and   
                Mauro Conti and   
           Fabio De Gaspari and   
               Radha Poovendran   LineSwitch: Tackling Control Plane
                                  Saturation Attacks in Software-Defined
                                  Networking . . . . . . . . . . . . . . . 1206--1219
                 Zuqing Zhu and   
                  Xiahe Liu and   
               Yixiang Wang and   
                     Wei Lu and   
                  Long Gong and   
                    Shui Yu and   
                  Nirwan Ansari   Impairment- and Splitting-Aware
                                  Cloud-Ready Multicast Provisioning in
                                  Elastic Optical Networks . . . . . . . . 1220--1234
                Huichen Dai and   
                Jianyuan Lu and   
                    Yi Wang and   
                   Tian Pan and   
                        Bin Liu   BFAST: High-Speed and Memory-Efficient
                                  Approach for NDN Forwarding Engine . . . 1235--1248
                   Min Chen and   
               Shigang Chen and   
                    Zhiping Cai   Counter Tree: a Scalable Counter
                                  Architecture for Per-Flow Traffic
                                  Measurement  . . . . . . . . . . . . . . 1249--1262
           Brigitte Jaumard and   
                Maryam Daryalal   Efficient Spectrum Utilization in Large
                                  Scale RWA Problems . . . . . . . . . . . 1263--1278
               Kangwook Lee and   
           Ramtin Pedarsani and   
             Kannan Ramchandran   On Scheduling Redundant Requests With
                                  Cancellation Overheads . . . . . . . . . 1279--1290

IEEE\slash ACM Transactions on Networking
Volume 25, Number 3, June, 2017

            Niv Voskoboynik and   
           Haim H. Permuter and   
                     Asaf Cohen   Network Coding Schemes for Data Exchange
                                  Networks With Arbitrary Transmission
                                  Delays . . . . . . . . . . . . . . . . . 1293--1309
            Salvatore D'Oro and   
                Eylem Ekici and   
                 Sergio Palazzo   Optimal Power Allocation and Scheduling
                                  Under Jamming Attacks  . . . . . . . . . 1310--1323
                Runtian Ren and   
                Xueyan Tang and   
                   Yusen Li and   
                    Wentong Cai   Competitiveness of Dynamic Bin Packing
                                  for Online Cloud Server Allocation . . . 1324--1331
          Ori Rottenstreich and   
         Mario Di Francesco and   
                    Yoram Revah   Perfectly Periodic Scheduling of
                                  Collective Data Streams  . . . . . . . . 1332--1346
                   Wei Gong and   
             Jiangchuan Liu and   
                  Kebin Liu and   
                     Yunhao Liu   Toward More Rigorous and Practical
                                  Cardinality Estimation for Large-Scale
                                  RFID Systems . . . . . . . . . . . . . . 1347--1358
           George Iosifidis and   
      Iordanis Koutsopoulos and   
           Georgios Smaragdakis   Distributed Storage Control Algorithms
                                  for Dynamic Networks . . . . . . . . . . 1359--1372
  Hassan Habibi Gharakheili and   
            Vijay Sivaraman and   
                  Tim Moors and   
            Arun Vishwanath and   
              John Matthews and   
                  Craig Russell   Enabling Fast and Slow Lanes for Content
                                  Providers Using Software Defined
                                  Networking . . . . . . . . . . . . . . . 1373--1385
           George Iosifidis and   
                    Lin Gao and   
              Jianwei Huang and   
             Leandros Tassiulas   Efficient and Fair Collaborative Mobile
                                  Internet Access  . . . . . . . . . . . . 1386--1400
                   Shu Wang and   
      Vignesh Venkateswaran and   
                    Xinyu Zhang   Fundamental Analysis of Full-Duplex
                                  Gains in Wireless Networks . . . . . . . 1401--1416
         Paolo Di Francesco and   
              Jacek Kibilda and   
       Francesco Malandrino and   
       Nicholas J. Kaminski and   
                Luiz A. DaSilva   Sensitivity Analysis on Service-Driven
                                  Network Planning . . . . . . . . . . . . 1417--1430
                Zizhong Cao and   
        Shivendra S. Panwar and   
            Murali Kodialam and   
                 T. V. Lakshman   Enhancing Mobile Networks With Software
                                  Defined Networking and Cloud Computing   1431--1444
             You-Chiun Wang and   
                  Tzung-Yu Tsai   A Pricing-Aware Resource Scheduling
                                  Framework for LTE Networks . . . . . . . 1445--1458
                Tuan A. Dao and   
            Indrajeet Singh and   
       Harsha V. Madhyastha and   
  Srikanth V. Krishnamurthy and   
                Guohong Cao and   
              Prasant Mohapatra   TIDE: a User-Centric Tool for
                                  Identifying Energy Hungry Applications
                                  on Smartphones . . . . . . . . . . . . . 1459--1474
                   Min Chen and   
               Shigang Chen and   
                   Yuguang Fang   Lightweight Anonymous Authentication
                                  Protocols for RFID Systems . . . . . . . 1475--1488
          Faycal Ait Aoudia and   
           Matthieu Gautier and   
              Michele Magno and   
             Olivier Berder and   
                    Luca Benini   A Generic Framework for Modeling MAC
                                  Protocols in Wireless Sensor Networks    1489--1500
            Sukanya Bhowmik and   
       Muhammad Adnan Tariq and   
            Boris Koldehofe and   
                 Frank Durr and   
              Thomas Kohler and   
                 Kurt Rothermel   High Performance Publish\slash Subscribe
                                  Middleware in Software-Defined Networks  1501--1516
            Amir Houmansadr and   
               Wenxuan Zhou and   
             Matthew Caesar and   
                 Nikita Borisov   SWEET: Serving the Web by Exploiting
                                  Email Tunnels  . . . . . . . . . . . . . 1517--1527
             Wenzhuo Ouyang and   
                Jingwen Bai and   
             Ashutosh Sabharwal   Leveraging One-Hop Information in
                                  Massive MIMO Full-Duplex Wireless
                                  Systems  . . . . . . . . . . . . . . . . 1528--1539
         Nikolaos Papanikos and   
           Evangelos Papapetrou   Deterministic Broadcasting and Random
                                  Linear Network Coding in Mobile Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 1540--1554
            Chang-Heng Wang and   
                    Tara Javidi   Adaptive Policies for Scheduling With
                                  Reconfiguration Delay: an End-to-End
                                  Solution for All-Optical Data Centers    1555--1568
                  Jiajue Ou and   
                      Mo Li and   
                 Yuanqing Zheng   Come and Be Served: Parallel Decoding
                                  for COTS RFID Tags . . . . . . . . . . . 1569--1581
                  Paul Tune and   
                Matthew Roughan   Controlled Synthesis of Traffic Matrices 1582--1592
         Eva Papadogiannaki and   
          Lazaros Koromilas and   
         Giorgos Vasiliadis and   
              Sotiris Ioannidis   Efficient Software Packet Processing on
                                  Heterogeneous and Asymmetric Hardware
                                  Architectures  . . . . . . . . . . . . . 1593--1606
                   Min Chen and   
               Shigang Chen and   
                   You Zhou and   
                   Youlin Zhang   Identifying State-Free Networked Tags    1607--1620
             Bhushan Kotnis and   
               Albert Sunny and   
                       Joy Kuri   Incentivized Campaigning in Social
                                  Networks . . . . . . . . . . . . . . . . 1621--1634
            Mostafa Dehghan and   
                   Bo Jiang and   
            Anand Seetharam and   
                    Ting He and   
        Theodoros Salonidis and   
                 Jim Kurose and   
                Don Towsley and   
               Ramesh Sitaraman   On the Complexity of Optimal Request
                                  Routing and Content Caching in
                                  Heterogeneous Cache Networks . . . . . . 1635--1648
         Stefano Vissicchio and   
           Laurent Vanbever and   
             Luca Cittadini and   
            Geoffrey G. Xie and   
            Olivier Bonaventure   Safe Update of Hybrid SDN Networks . . . 1649--1662
                   Wei Wang and   
               Yingjie Chen and   
                    Lu Wang and   
                     Qian Zhang   Sampleless Wi-Fi: Bringing Low Power to
                                  Wi-Fi Communications . . . . . . . . . . 1663--1672
                 Zhili Zhou and   
                 Tachun Lin and   
   Krishnaiyan Thulasiraman and   
                   Guoliang Xue   Novel Survivable Logical Topology
                                  Routing by Logical Protecting Spanning
                                  Trees in IP-Over-WDM Networks  . . . . . 1673--1685
                     Fan Wu and   
                Dongxin Liu and   
                  Zhihao Wu and   
                 Yuan Zhang and   
                    Guihai Chen   Cost-Efficient Indoor White Space
                                  Exploration Through Compressive Sensing  1686--1702
               Xiaowen Gong and   
                    Xu Chen and   
                   Kai Xing and   
             Dong-Hoon Shin and   
             Mengyuan Zhang and   
                  Junshan Zhang   From Social Group Utility Maximization
                                  to Personalized Location Privacy in
                                  Mobile Networks  . . . . . . . . . . . . 1703--1716
                  Seydou Ba and   
     Bijoy Chand Chatterjee and   
                       Eiji Oki   Defragmentation Scheme Based on
                                  Exchanging Primary and Backup Paths in $
                                  1 + 1 $ Path Protected Elastic Optical
                                  Networks . . . . . . . . . . . . . . . . 1717--1731
                    Ting He and   
         Athanasios Gkelias and   
                   Liang Ma and   
               Kin K. Leung and   
            Ananthram Swami and   
                    Don Towsley   Robust and Efficient Monitor Placement
                                  for Network Tomography in Dynamic
                                  Networks . . . . . . . . . . . . . . . . 1732--1745
                   Yong Cui and   
                  Jian Song and   
                    Kui Ren and   
                 Minming Li and   
                Zongpeng Li and   
                Qingmei Ren and   
                  Yangjun Zhang   Software Defined Cooperative Offloading
                                  for Mobile Cloudlets . . . . . . . . . . 1746--1760
                  Chuchu Wu and   
                Mario Gerla and   
         Mihaela van der Schaar   Social Norm Incentives for Network
                                  Coding in Manets . . . . . . . . . . . . 1761--1774
           Matthew Johnston and   
                  Eytan Modiano   Controller Placement in Wireless
                                  Networks With Delayed CSI  . . . . . . . 1775--1788
                       Jun Zhao   Topological Properties of Secure
                                  Wireless Sensor Networks Under the
                                  $q$-Composite Key Predistribution Scheme
                                  With Unreliable Links  . . . . . . . . . 1789--1802
                    Tuo Shi and   
                Siyao Cheng and   
                Zhipeng Cai and   
                 Yingshu Li and   
                   Jianzhong Li   Exploring Connected Dominating Sets in
                                  Energy Harvest Networks  . . . . . . . . 1803--1817
            Alberto Ceselli and   
              Marco Premoli and   
                  Stefano Secci   Mobile Edge Cloud Network Design
                                  Optimization . . . . . . . . . . . . . . 1818--1831
              Xueqing Huang and   
                    Tao Han and   
                  Nirwan Ansari   Smart Grid Enabled Mobile Networks:
                                  Jointly Optimizing BS Operation and
                                  Power Distribution . . . . . . . . . . . 1832--1845
                 Nanxi Kang and   
          Ori Rottenstreich and   
              Sanjay G. Rao and   
               Jennifer Rexford   Alpaca: Compact Network Policies With
                                  Attribute-Encoded Addresses  . . . . . . 1846--1860
                  Hongli Xu and   
              Xiang-Yang Li and   
             Liusheng Huang and   
                   Hou Deng and   
                   He Huang and   
                     Haibo Wang   Incremental Deployment and Throughput
                                  Maximization Routing for a Hybrid SDN    1861--1875
          Shiva Raj Pokhrel and   
                Manoj Panda and   
                      Hai L. Vu   Analytical Modeling of Multipath TCP
                                  Over Last-Mile Wireless  . . . . . . . . 1876--1891
                     Mao Ge and   
                    Tong Ye and   
                Tony T. Lee and   
                    Weisheng Hu   Multicast Routing and Wavelength
                                  Assignment in AWG-Based Clos Networks    1892--1909
          Kate Ching-Ju Lin and   
             Wei-Liang Shen and   
             Ming-Syan Chen and   
                        Kun Tan   User-Centric Network MIMO With Dynamic
                                  Clustering . . . . . . . . . . . . . . . 1910--1923
          Luca Chiaraviglio and   
            Lavinia Amorosi and   
             Paolo DellOlmo and   
                William Liu and   
         Jairo A. Gutierrez and   
          Antonio Cianfrani and   
            Marco Polverini and   
           Esther Le Rouzic and   
                 Marco Listanti   Lifetime-Aware ISP Networks: Optimal
                                  Formulation and Solutions  . . . . . . . 1924--1937

IEEE\slash ACM Transactions on Networking
Volume 25, Number 4, August, 2017

                   Guo Chen and   
               Youjian Zhao and   
                Hailiang Xu and   
                    Dan Pei and   
                         Dan Li   $ {\rm F}^2 $ Tree: Rapid Failure
                                  Recovery for Routing in Production Data
                                  Center Networks  . . . . . . . . . . . . 1940--1953
                    Wei Bai and   
                    Li Chen and   
                   Kai Chen and   
                 Dongsu Han and   
                  Chen Tian and   
                       Hao Wang   PIAS: Practical Information-Agnostic
                                  Flow Scheduling for Commodity Data
                                  Centers  . . . . . . . . . . . . . . . . 1954--1967
   Peruru Subrahmanya Swamy and   
        Radha Krishna Ganti and   
            Krishna Jagannathan   Adaptive CSMA Under the SINR Model:
                                  Efficient Approximation Algorithms for
                                  Throughput and Utility Maximization  . . 1968--1981
                   Lin Chen and   
                    Yong Li and   
        Athanasios V. Vasilakos   On Oblivious Neighbor Discovery in
                                  Distributed Wireless Networks With
                                  Directional Antennas: Theoretical
                                  Foundation and Algorithm Design  . . . . 1982--1993
              Liqiong Chang and   
             Xiaojiang Chen and   
                    Yu Wang and   
                Dingyi Fang and   
                    Ju Wang and   
             Tianzhang Xing and   
                  Zhanyong Tang   FitLoc: Fine-Grained and Low-Cost
                                  Device-Free Localization for Multiple
                                  Targets Over Various Areas . . . . . . . 1994--2007
             Vincenzo Eramo and   
            Emanuele Miucci and   
              Mostafa Ammar and   
     Francesco Giacinto Lavacca   An Approach for Service Function Chain
                                  Routing and Virtual Function Network
                                  Instance Migration in Network Function
                                  Virtualization Architectures . . . . . . 2008--2025
                   Yuben Qu and   
                  Chao Dong and   
                Haipeng Dai and   
                     Fan Wu and   
               Shaojie Tang and   
                   Hai Wang and   
                     Chang Tian   Multicast in Multihop CRNs Under
                                  Uncertain Spectrum Availability: a
                                  Network Coding Approach  . . . . . . . . 2026--2039
               Yiming Zhang and   
               Dongsheng Li and   
             Chuanxiong Guo and   
                  Haitao Wu and   
            Yongqiang Xiong and   
                     Xicheng Lu   CubicRing: Exploiting Network Proximity
                                  for Distributed In-Memory Key-Value
                                  Store  . . . . . . . . . . . . . . . . . 2040--2053
              Massimo Monti and   
          Manolis Sifalakis and   
      Christian F. Tschudin and   
                    Marco Luise   On Hardware Programmable Network
                                  Dynamics With a Chemistry-Inspired
                                  Abstraction  . . . . . . . . . . . . . . 2054--2067
      Mohammad Hassan Lotfi and   
     Karthikeyan Sundaresan and   
             Saswati Sarkar and   
      Mohammad Ali Khojastepour   Economics of Quality Sponsored Data in
                                  Non-Neutral Networks . . . . . . . . . . 2068--2081
                   Bo Cheng and   
                  Ming Wang and   
                 Shuai Zhao and   
               Zhongyi Zhai and   
                     Da Zhu and   
                  Junliang Chen   Situation-Aware Dynamic Service
                                  Coordination in an IoT Environment . . . 2082--2095
                  Daibo Liu and   
                Zhichao Cao and   
                   Yi Zhang and   
                    Mengshu Hou   Achieving Accurate and Real-Time Link
                                  Estimation for Low Power Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 2096--2109
                  Haoran Yu and   
             Man Hon Cheung and   
                    Lin Gao and   
                  Jianwei Huang   Public Wi-Fi Monetization via
                                  Advertising  . . . . . . . . . . . . . . 2110--2121
               Kyuyong Shin and   
            Carlee Joe-Wong and   
                 Sangtae Ha and   
                    Yung Yi and   
                Injong Rhee and   
              Douglas S. Reeves   T-Chain: a General Incentive Scheme for
                                  Cooperative Computing  . . . . . . . . . 2122--2137
                Dongxiao Yu and   
                    Li Ning and   
                  Yifei Zou and   
                   Jiguo Yu and   
              Xiuzhen Cheng and   
              Francis C. M. Lau   Distributed Spanner Construction With
                                  Physical Interference: Constant Stretch
                                  and Linear Sparseness  . . . . . . . . . 2138--2151
            Romain Fontugne and   
               Patrice Abry and   
             Kensuke Fukuda and   
              Darryl Veitch and   
                Kenjiro Cho and   
             Pierre Borgnat and   
                   Herwig Wendt   Scaling in Internet Traffic: a 14 Year
                                  and 3 Day Longitudinal Study, With
                                  Multiscale Analyses and Random
                                  Projections  . . . . . . . . . . . . . . 2152--2165
                   Yang Liu and   
                    Mingyan Liu   An Online Learning Approach to Improving
                                  the Quality of Crowd-Sourcing  . . . . . 2166--2179
                Xiaohan Wei and   
               Michael J. Neely   Data Center Server Provision:
                                  Distributed Asynchronous Control for
                                  Coupled Renewal Systems  . . . . . . . . 2180--2194
                         Li and   
                      Ke Xu and   
                   Dan Wang and   
                Chunyi Peng and   
                  Kai Zheng and   
             Rashid Mijumbi and   
                  Qingyang Xiao   A Longitudinal Measurement Study of TCP
                                  Performance and Behavior in 3G/4G
                                  Networks Over High Speed Rails . . . . . 2195--2208
               Jianan Zhang and   
              Eytan Modiano and   
                      David Hay   Enhancing Network Robustness via
                                  Shielding  . . . . . . . . . . . . . . . 2209--2222
               Xiaofeng Gao and   
                 Xudong Zhu and   
                     Jun Li and   
                     Fan Wu and   
                Guihai Chen and   
                Ding-Zhu Du and   
                   Shaojie Tang   A Novel Approximation for Multi-Hop
                                  Connected Clustering Problem in Wireless
                                  Networks . . . . . . . . . . . . . . . . 2223--2234
          Novella Bartolini and   
         Stefano Ciavarella and   
         Thomas F. La Porta and   
               Simone Silvestri   On Critical Service Recovery After
                                  Massive Network Failures . . . . . . . . 2235--2249
              Guiyuan Jiang and   
               Siew-Kei Lam and   
                  Yidan Sun and   
                   Lijia Tu and   
                      Jigang Wu   Joint Charging Tour Planning and Depot
                                  Positioning for Wireless Sensor Networks
                                  Using Mobile Chargers  . . . . . . . . . 2250--2266
                     Fei Gu and   
                Jianwei Niu and   
                   Lingjie Duan   WAIPO: a Fusion-Based Collaborative
                                  Indoor Localization System on
                                  Smartphones  . . . . . . . . . . . . . . 2267--2280
                   Kai Chen and   
                  Xitao Wen and   
                  Xingyu Ma and   
                   Yan Chen and   
                   Yong Xia and   
               Chengchen Hu and   
               Qunfeng Dong and   
                  Yongqiang Liu   Toward A Scalable, Fault-Tolerant,
                                  High-Performance Optical Data Center
                                  Architecture . . . . . . . . . . . . . . 2281--2294
               Gil Einziger and   
                   Roy Friedman   TinySet --- An Access Efficient Self
                                  Adjusting Bloom Filter Construction  . . 2295--2307
             Peter Babarczi and   
             Janos Tapolcai and   
                Alija Pasic and   
               Lajos Ronyai and   
     Erika R. Berczi-Kovacs and   
                  Muriel Medard   Diversity Coding in Two-Connected
                                  Networks . . . . . . . . . . . . . . . . 2308--2319
                    Chao Wu and   
                    Xu Chen and   
                  Wenwu Zhu and   
                   Yaoxue Zhang   Socially-Driven Learning-Based
                                  Prefetching in Mobile Online Social
                                  Networks . . . . . . . . . . . . . . . . 2320--2333
                     Rui Li and   
                Alex X. Liu and   
                 Sheng Xiao and   
                 Hongyue Xu and   
      Bezawada Bruhadeshwar and   
                    Ann L. Wang   Privacy and Integrity Preserving Top-$k$
                                  Query Processing for Two-Tiered Sensor
                                  Networks . . . . . . . . . . . . . . . . 2334--2346
                  Xitao Wen and   
                     Kai Bu and   
                    Bo Yang and   
                   Yan Chen and   
                Li Erran Li and   
               Xiaolin Chen and   
              Jianfeng Yang and   
                       Xue Leng   RuleScope: Inspecting Forwarding Faults
                                  for Software-Defined Networking  . . . . 2347--2360
               Weng Chon Ao and   
           Konstantinos Psounis   Approximation Algorithms for Online User
                                  Association in Multi-Tier Multi-Cell
                                  Mobile Networks  . . . . . . . . . . . . 2361--2374
               Jinbei Zhang and   
                   Luoyi Fu and   
                    Qi Wang and   
                  Liang Liu and   
                 Xinyu Wang and   
                   Xinbing Wang   Connectivity Analysis in Wireless
                                  Networks With Correlated Mobility and
                                  Cluster Scalability  . . . . . . . . . . 2375--2390
                  Haitao Wu and   
                   Fen Zhou and   
                 Zuqing Zhu and   
                    Yaojun Chen   On the Distance Spectrum Assignment in
                                  Elastic Optical Networks . . . . . . . . 2391--2404
                  Zimu Zhou and   
          Longfei Shangguan and   
             Xiaolong Zheng and   
                   Lei Yang and   
                     Yunhao Liu   Design and Implementation of an
                                  RFID-Based Customer Shopping Behavior
                                  Mining System  . . . . . . . . . . . . . 2405--2418
             Hung T. Nguyen and   
                 My T. Thai and   
                  Thang N. Dinh   A Billion-Scale Approximation Algorithm
                                  for Maximizing Benefit in Viral
                                  Marketing  . . . . . . . . . . . . . . . 2419--2429
                Zain Shamsi and   
                Dmitri Loguinov   Unsupervised Clustering Under Temporal
                                  Feature Volatility in Network Stack
                                  Fingerprinting . . . . . . . . . . . . . 2430--2443
            Pooja Vyavahare and   
               Nutan Limaye and   
              Ajit A. Diwan and   
                   D. Manjunath   On the Maximum Rate of Networked
                                  Computation in a Capacitated Network . . 2444--2458
              Xiujuan Zhang and   
                   Jiguo Yu and   
                     Wei Li and   
              Xiuzhen Cheng and   
                Dongxiao Yu and   
                      Feng Zhao   Localized Algorithms for Yao Graph-Based
                                  Spanner Construction in Wireless
                                  Networks Under SINR  . . . . . . . . . . 2459--2472
               Haifeng Zhou and   
                Chunming Wu and   
               Qiumei Cheng and   
                    Qianjun Liu   SDN--LIRU: a Lossless and Seamless
                                  Method for SDN Inter-Domain Route
                                  Updates  . . . . . . . . . . . . . . . . 2473--2483
                  Richard J. La   Effects of Degree Correlations in
                                  Interdependent Security: Good or Bad?    2484--2497
                 Guoxin Liu and   
                   Haiying Shen   Minimum-Cost Cloud Storage Service
                                  Across Multiple Cloud Providers  . . . . 2498--2513
               Maurizio Rea and   
          Aymen Fakhreddine and   
       Domenico Giustiniano and   
                Vincent Lenders   Filtering Noisy 802.11 Time-of-Flight
                                  Ranging Measurements From Commoditized
                                  WiFi Radios  . . . . . . . . . . . . . . 2514--2527
                   Wei Gong and   
             Jiangchuan Liu and   
                       Zhe Yang   Efficient Unknown Tag Detection in
                                  Large-Scale RFID Systems With Unreliable
                                  Channels . . . . . . . . . . . . . . . . 2528--2539
              Shih-Chun Lin and   
                    Pu Wang and   
            Ian F. Akyildiz and   
                        Min Luo   Delay-Based Maximum Power-Weight
                                  Scheduling With Heavy-Tailed Traffic . . 2540--2555
                   Lei Jiao and   
       Antonia Maria Tulino and   
               Jaime Llorca and   
                    Yue Jin and   
                Alessandra Sala   Smoothed Online Resource Allocation in
                                  Multi-Tier Distributed Cloud Networks    2556--2570
             Shay Vargaftik and   
             Isaac Keslassy and   
                     Ariel Orda   No Packet Left Behind: Avoiding
                                  Starvation in Dynamic Topologies . . . . 2571--2584

IEEE\slash ACM Transactions on Networking
Volume 25, Number 5, October, 2017

                Xiulong Liu and   
                   Keqiu Li and   
                   Song Guo and   
                Alex X. Liu and   
                    Peng Li and   
                   Kun Wang and   
                     Jie Wu and   
                Xiulong Liu and   
                   Keqiu Li and   
                   Song Guo and   
                Alex X. Liu and   
                    Peng Li and   
                   Kun Wang and   
                         Jie Wu   Top-$k$ Queries for Categorized RFID
                                  Systems  . . . . . . . . . . . . . . . . 2587--2600
             Fulvio Valenza and   
             Cataldo Basile and   
           Daniele Canavese and   
               Antonio Lioy and   
             Fulvio Valenza and   
             Cataldo Basile and   
           Daniele Canavese and   
                   Antonio Lioy   Classification and Analysis of
                                  Communication Protection Policy
                                  Anomalies  . . . . . . . . . . . . . . . 2601--2614
         Nathaniel M. Jones and   
        Georgios S. Paschos and   
             Brooke Shrader and   
              Eytan Modiano and   
         Nathaniel M. Jones and   
        Georgios S. Paschos and   
             Brooke Shrader and   
                  Eytan Modiano   An Overlay Architecture for Throughput
                                  Optimal Multipath Routing  . . . . . . . 2615--2628
           Gaetano Carlucci and   
              Luca De Cicco and   
              Stefan Holmer and   
                Saverio Mascolo   Congestion Control for Web Real-Time
                                  Communication  . . . . . . . . . . . . . 2629--2642
                  Songze Li and   
                    Qian Yu and   
    Mohammad Ali Maddah-Ali and   
       A. Salman Avestimehr and   
                  Songze Li and   
                    Qian Yu and   
    Mohammad Ali Maddah-Ali and   
           A. Salman Avestimehr   A Scalable Framework for Wireless
                                  Distributed Computing  . . . . . . . . . 2643--2654
             Yuanqing Zheng and   
                Guobin Shen and   
                   Liqun Li and   
              Chunshui Zhao and   
                      Mo Li and   
                  Feng Zhao and   
             Yuanqing Zheng and   
                Guobin Shen and   
                   Liqun Li and   
              Chunshui Zhao and   
                      Mo Li and   
                      Feng Zhao   Travi-Navi: Self-Deployable Indoor
                                  Navigation System  . . . . . . . . . . . 2655--2669
               Qingjun Xiao and   
               Shigang Chen and   
                   Min Chen and   
                  Yian Zhou and   
                Zhiping Cai and   
                Junzhou Luo and   
               Qingjun Xiao and   
               Shigang Chen and   
                   Min Chen and   
                  Yian Zhou and   
                Zhiping Cai and   
                    Junzhou Luo   Adaptive Joint Estimation Protocol for
                                  Arbitrary Pair of Tag Sets in a
                                  Distributed RFID System  . . . . . . . . 2670--2685
                 Liang Wang and   
               Gareth Tyson and   
          Jussi Kangasharju and   
              Jon Crowcroft and   
                 Liang Wang and   
               Gareth Tyson and   
          Jussi Kangasharju and   
                  Jon Crowcroft   Milking the Cache Cow With Fairness in
                                  Mind . . . . . . . . . . . . . . . . . . 2686--2700
                   Jiyan Wu and   
                   Bo Cheng and   
                  Ming Wang and   
              Junliang Chen and   
                   Jiyan Wu and   
                   Bo Cheng and   
                  Ming Wang and   
                  Junliang Chen   Quality-Aware Energy Optimization in
                                  Wireless Video Communication With
                                  Multipath TCP  . . . . . . . . . . . . . 2701--2718
                      Qi Li and   
          Patrick P. C. Lee and   
                 Peng Zhang and   
                   Purui Su and   
                   Liang He and   
                    Kui Ren and   
                      Qi Li and   
          Patrick P. C. Lee and   
                 Peng Zhang and   
                   Purui Su and   
                   Liang He and   
                        Kui Ren   Capability-Based Security Enforcement in
                                  Named Data Networking  . . . . . . . . . 2719--2730
      Renan Fischer e Silva and   
              Paul M. Carpenter   Energy Efficient Ethernet on MapReduce
                                  Clusters: Packet Coalescing To Improve
                                  10GbE Links  . . . . . . . . . . . . . . 2731--2742
     Costas A. Courcoubetis and   
            Antonis Dimakis and   
         Michalis Kanakakis and   
     Costas A. Courcoubetis and   
            Antonis Dimakis and   
             Michalis Kanakakis   Congestion Control for Background Data
                                  Transfers With Minimal Delay Impact  . . 2743--2758
               Yossi Kanizo and   
          Ori Rottenstreich and   
                Itai Segall and   
               Jose Yallouz and   
               Yossi Kanizo and   
          Ori Rottenstreich and   
                Itai Segall and   
                   Jose Yallouz   Optimizing Virtual Backup Allocation for
                                  Middleboxes  . . . . . . . . . . . . . . 2759--2772
                Xiaodan Pan and   
                    Tong Ye and   
                Tony T. Lee and   
                Weisheng Hu and   
                Xiaodan Pan and   
                    Tong Ye and   
                Tony T. Lee and   
                    Weisheng Hu   Power Efficiency and Delay Tradeoff of
                                  10GBase-T Energy Efficient Ethernet
                                  Protocol . . . . . . . . . . . . . . . . 2773--2787
                   Tao Wang and   
               Fangming Liu and   
                    Hong Xu and   
                   Tao Wang and   
               Fangming Liu and   
                        Hong Xu   An Efficient Online Algorithm for
                                  Dynamic SDN Controller Assignment in
                                  Data Center Networks . . . . . . . . . . 2788--2801
                 Rami Cohen and   
              Yuval Cassuto and   
                 Rami Cohen and   
                  Yuval Cassuto   Coding for Improved Throughput
                                  Performance in Network Switches  . . . . 2802--2814
      Jesus Gomez-Vilardebo and   
          Jesus Gomez-Vilardebo   Routing in Accumulative Multi-Hop
                                  Networks . . . . . . . . . . . . . . . . 2815--2828
              Xiaomei Zhang and   
                Guohong Cao and   
              Xiaomei Zhang and   
                    Guohong Cao   Transient Community Detection and Its
                                  Application to Data Forwarding in Delay
                                  Tolerant Networks  . . . . . . . . . . . 2829--2843
            Sharan Naribole and   
            Edward Knightly and   
            Sharan Naribole and   
                Edward Knightly   Scalable Multicast in Highly-Directional
                                  $ 60$-GHz WLANs  . . . . . . . . . . . . 2844--2857
              Mehdi Nikkhah and   
                Aman Mangal and   
       Constantine Dovrolis and   
                Roch Guerin and   
              Mehdi Nikkhah and   
                Aman Mangal and   
       Constantine Dovrolis and   
                    Roch Guerin   A Statistical Exploration of Protocol
                                  Adoption . . . . . . . . . . . . . . . . 2858--2871
                Zhichao Cao and   
                  Daibo Liu and   
               Jiliang Wang and   
                 Xiaolong Zheng   Chase: Taming Concurrent Broadcast for
                                  Flooding in Asynchronous Duty Cycle
                                  Networks . . . . . . . . . . . . . . . . 2872--2885
                Huazhe Wang and   
                  Chen Qian and   
                      Ye Yu and   
               Hongkun Yang and   
               Simon S. Lam and   
                Huazhe Wang and   
                  Chen Qian and   
                      Ye Yu and   
               Hongkun Yang and   
                   Simon S. Lam   Practical Network-Wide Packet Behavior
                                  Identification by AP Classifier  . . . . 2886--2899
               Hongkun Yang and   
               Simon S. Lam and   
               Hongkun Yang and   
                   Simon S. Lam   Scalable Verification of Networks With
                                  Packet Transformers Using Atomic
                                  Predicates . . . . . . . . . . . . . . . 2900--2915
             Zhenghao Zhang and   
                 Zhenghao Zhang   Analog Bloom Filter and Contention-Free
                                  Multi-Bit Simultaneous Query for
                                  Centralized Wireless Networks  . . . . . 2916--2929
                Arash Asadi and   
           Vincenzo Mancuso and   
                Rohit Gupta and   
                Arash Asadi and   
           Vincenzo Mancuso and   
                    Rohit Gupta   DORE: an Experimental Framework to
                                  Enable Outband D$2$D Relay in Cellular
                                  Networks . . . . . . . . . . . . . . . . 2930--2943
                    Tie Qiu and   
                Aoyang Zhao and   
                   Feng Xia and   
                Weisheng Si and   
           Dapeng Oliver Wu and   
                    Tie Qiu and   
                Aoyang Zhao and   
                   Feng Xia and   
                Weisheng Si and   
               Dapeng Oliver Wu   ROSE: Robustness Strategy for Scale-Free
                                  Wireless Sensor Networks . . . . . . . . 2944--2959
               Longbo Huang and   
                   Longbo Huang   Intelligence of Smart Systems: Model,
                                  Bounds, and Algorithms . . . . . . . . . 2960--2973
               Song Min Kim and   
             Shigemi Ishida and   
                 Shuai Wang and   
                    Tian He and   
               Song Min Kim and   
             Shigemi Ishida and   
                 Shuai Wang and   
                        Tian He   Free Side-Channel Cross-Technology
                                  Communication in Wireless Networks . . . 2974--2987
                 Anurag Rai and   
               Chih-ping Li and   
           Georgios Paschos and   
              Eytan Modiano and   
                 Anurag Rai and   
               Chih-ping Li and   
           Georgios Paschos and   
                  Eytan Modiano   Loop-Free Backpressure Routing Using
                                  Link-Reversal Algorithms . . . . . . . . 2988--3002
              Michael Brown and   
             Colin Marshall and   
                 Dejun Yang and   
                    Ming Li and   
                   Jian Lin and   
               Guoliang Xue and   
              Michael Brown and   
             Colin Marshall and   
                 Dejun Yang and   
                    Ming Li and   
                   Jian Lin and   
                   Guoliang Xue   Maximizing Capacity in Cognitive Radio
                                  Networks Under Physical Interference
                                  Model  . . . . . . . . . . . . . . . . . 3003--3015
                Yongquan Fu and   
             Ernst Biersack and   
                Yongquan Fu and   
                 Ernst Biersack   MCR: Structure-Aware Overlay-Based
                                  Latency-Optimal Greedy Relay Search  . . 3016--3029
              Milad Mahdian and   
              Edmund M. Yeh and   
              Milad Mahdian and   
                  Edmund M. Yeh   Throughput and Delay Scaling of
                                  Content-Centric Ad Hoc and Heterogeneous
                                  Wireless Networks  . . . . . . . . . . . 3030--3043
            Pablo Caballero and   
              Albert Banchs and   
         Gustavo de Veciana and   
         Xavier Costa-Perez and   
            Pablo Caballero and   
              Albert Banchs and   
         Gustavo de Veciana and   
             Xavier Costa-Perez   Multi-Tenant Radio Access Network
                                  Slicing: Statistical Multiplexing of
                                  Spatial Loads  . . . . . . . . . . . . . 3044--3058
              Aziz Mohaisen and   
                    Kui Ren and   
              Aziz Mohaisen and   
                        Kui Ren   Leakage of .onion at the DNS Root:
                                  Measurements, Causes, and
                                  Countermeasures  . . . . . . . . . . . . 3059--3072
                  Hongli Xu and   
                Zhuolong Yu and   
              Xiang-Yang Li and   
             Liusheng Huang and   
                  Chen Qian and   
                 Taeho Jung and   
                  Hongli Xu and   
                Zhuolong Yu and   
              Xiang-Yang Li and   
             Liusheng Huang and   
                  Chen Qian and   
                     Taeho Jung   Joint Route Selection and Update
                                  Scheduling for Low-Latency Update in
                                  SDNs . . . . . . . . . . . . . . . . . . 3073--3087
             Abhishek Sinha and   
           Georgios Paschos and   
              Eytan Modiano and   
             Abhishek Sinha and   
           Georgios Paschos and   
                  Eytan Modiano   Throughput-Optimal Multi-Hop Broadcast
                                  Algorithms . . . . . . . . . . . . . . . 3088--3101
         Stefano Vissicchio and   
             Luca Cittadini and   
         Stefano Vissicchio and   
                 Luca Cittadini   Safe, Efficient, and Robust SDN Updates
                                  by Combining Rule Replacements and
                                  Additions  . . . . . . . . . . . . . . . 3102--3115
                  Tong Yang and   
                Alex X. Liu and   
           Muhammad Shahzad and   
             Dongsheng Yang and   
                 Qiaobin Fu and   
                Gaogang Xie and   
                Xiaoming Li and   
                  Tong Yang and   
                Alex X. Liu and   
           Muhammad Shahzad and   
             Dongsheng Yang and   
                 Qiaobin Fu and   
                Gaogang Xie and   
                    Xiaoming Li   A Shifting Framework for Set Queries . . 3116--3131
               Song Min Kim and   
                 Shuai Wang and   
                    Tian He and   
               Song Min Kim and   
                 Shuai Wang and   
                        Tian He   Exploiting Spatiotemporal Correlation
                                  for Wireless Networks Under Interference 3132--3145
          Antonio Cianfrani and   
             Marco Listanti and   
            Marco Polverini and   
          Antonio Cianfrani and   
             Marco Listanti and   
                Marco Polverini   Incremental Deployment of Segment
                                  Routing Into an ISP Network: a Traffic
                                  Engineering Perspective  . . . . . . . . 3146--3160
                Weifa Liang and   
                 Zichuan Xu and   
                Wenzheng Xu and   
                 Jiugen Shi and   
               Guoqiang Mao and   
                   Sajal K. Das   Approximation Algorithms for Charging
                                  Reward Maximization in Rechargeable
                                  Sensor Networks via a Mobile Charger . . 3161--3174
                  Peng Wang and   
                    Hong Xu and   
               Zhixiong Niu and   
                 Dongsu Han and   
            Yongqiang Xiong and   
                  Peng Wang and   
                    Hong Xu and   
               Zhixiong Niu and   
                 Dongsu Han and   
                Yongqiang Xiong   Expeditus: Congestion-Aware Load
                                  Balancing in Clos Data Center Networks   3175--3188
             Chiara Buratti and   
            Roberto Verdone and   
             Chiara Buratti and   
                Roberto Verdone   End-to-End Throughput of Ad Hoc
                                  Multi-Hop Networks in a Poisson Field of
                                  Interferers  . . . . . . . . . . . . . . 3189--3202
             Kensuke Fukuda and   
             John Heidemann and   
               Abdul Qadeer and   
             Kensuke Fukuda and   
             John Heidemann and   
                   Abdul Qadeer   Detecting Malicious Activity With DNS
                                  Backscatter Over Time  . . . . . . . . . 3203--3218
                  Hoang Dau and   
          Olgica Milenkovic and   
                  Hoang Dau and   
              Olgica Milenkovic   Latent Network Features and Overlapping
                                  Community Discovery via Boolean
                                  Intersection Representations . . . . . . 3219--3234

IEEE\slash ACM Transactions on Networking
Volume 25, Number 6, December, 2017

                   Luoyi Fu and   
                  Xinzhe Fu and   
                 Zhiying Xu and   
              Qianyang Peng and   
               Xinbing Wang and   
                      Songwu Lu   Determining Source--Destination
                                  Connectivity in Uncertain Networks:
                                  Modeling and Solutions . . . . . . . . . 3237--3252
               Luca Bedogni and   
              Angelo Trotta and   
            Marco Di Felice and   
                    Yue Gao and   
             Xingjian Zhang and   
              Qianyun Zhang and   
          Fabio Malabocchia and   
                 Luciano Bononi   Dynamic Adaptive Video Streaming on
                                  Heterogeneous TVWS and Wi-Fi Networks    3253--3266
              Cristina Cano and   
           Douglas J. Leith and   
     Andres Garcia-Saavedra and   
                  Pablo Serrano   Fair Coexistence of Scheduled and Random
                                  Access Wireless Networks: Unlicensed
                                  LTE/WiFi . . . . . . . . . . . . . . . . 3267--3281
         Ganesh C. Sankaran and   
          Krishna M. Sivalingam   Design and Analysis of Scheduling
                                  Algorithms for Optically Groomed Data
                                  Center Networks  . . . . . . . . . . . . 3282--3293
                   Chen Sun and   
                     Jun Bi and   
               Haoxian Chen and   
                 Hongxin Hu and   
              Zhilong Zheng and   
                Shuyong Zhu and   
                    Chenghui Wu   SDPA: Toward a Stateful Data Plane in
                                  Software-Defined Networking  . . . . . . 3294--3308
               Kirill Kogan and   
        Sergey I. Nikolenko and   
            Patrick Eugster and   
         Alexander Shalimov and   
              Ori Rottenstreich   Efficient FIB Representations on
                                  Distributed Platforms  . . . . . . . . . 3309--3322
          Cheng-Shang Chang and   
              Cheng-Yu Chen and   
              Duan-Shin Lee and   
                   Wanjiun Liao   Efficient Encoding of User IDs for
                                  Nearly Optimal Expected
                                  Time-To-Rendezvous in Heterogeneous
                                  Cognitive Radio Networks . . . . . . . . 3323--3337
               Tom Z. J. Fu and   
              Jianbing Ding and   
           Richard T. B. Ma and   
          Marianne Winslett and   
                   Yin Yang and   
                  Zhenjie Zhang   DRS: Auto-Scaling for Real-Time Stream
                                  Analytics  . . . . . . . . . . . . . . . 3338--3352
            Kristen Gardner and   
         Mor Harchol-Balter and   
         Alan Scheller-Wolf and   
                Benny Van Houdt   A Better Model for Job Redundancy:
                                  Decoupling Server Slowdown and Job Size  3353--3367
                  Tien Tran and   
               Min Kyung An and   
                  Dung T. Huynh   Antenna Orientation and Range Assignment
                                  Algorithms in Directional WSNs . . . . . 3368--3381
                Zongqing Lu and   
                   Xiao Sun and   
                Thomas La Porta   Cooperative Data Offload in
                                  Opportunistic Networks: From Mobile
                                  Devices to Infrastructure  . . . . . . . 3382--3395
        Nikolaos Sapountzis and   
   Thrasyvoulos Spyropoulos and   
              Navid Nikaein and   
                     Umer Salim   User Association in HetNets: Impact of
                                  Traffic Differentiation and Backhaul
                                  Limitations  . . . . . . . . . . . . . . 3396--3410
              Mingwei Zhang and   
                     Jun Li and   
                   Scott Brooks   I-Seismograph: Observing, Measuring, and
                                  Analyzing Internet Earthquakes . . . . . 3411--3426
                   Yong Cui and   
               Zhenjie Yang and   
                Shihan Xiao and   
                   Xin Wang and   
                   Shenghui Yan   Traffic-Aware Virtual Machine Migration
                                  in Topology-Adaptive DCN . . . . . . . . 3427--3440
                   Ying Cui and   
              Muriel Medard and   
                 Edmund Yeh and   
              Douglas Leith and   
                    Fan Lai and   
                   Ken R. Duffy   A Linear Network Code Construction for
                                  General Integer Connections Based on the
                                  Constraint Satisfaction Problem  . . . . 3441--3454
       Abhijit Bhattacharya and   
                   Anurag Kumar   Analytical Modeling of IEEE 802.11-Type
                                  CSMA/CA Networks With Short Term
                                  Unfairness . . . . . . . . . . . . . . . 3455--3472
                   Lei Deng and   
             Chih-Chun Wang and   
               Minghua Chen and   
                   Shizhen Zhao   Timely Wireless Flows With General
                                  Traffic Patterns: Capacity Region and
                                  Scheduling Algorithms  . . . . . . . . . 3473--3486
                  Jiao Zhou and   
                 Zhao Zhang and   
               Shaojie Tang and   
              Xiaohui Huang and   
                 Yuchang Mo and   
                    Ding-Zhu Du   Fault-Tolerant Virtual Backbone in
                                  Heterogeneous Wireless Sensor Network    3487--3499
                     Ye Liu and   
            Chung Shue Chen and   
               Chi Wan Sung and   
              Chandramani Singh   A Game Theoretic Distributed Algorithm
                                  for FeICIC Optimization in LTE-A HetNets 3500--3513
             Changhoon Yoon and   
               Seungsoo Lee and   
                 Heedo Kang and   
               Taejune Park and   
              Seungwon Shin and   
          Vinod Yegneswaran and   
             Phillip Porras and   
                      Guofei Gu   Flow Wars: Systemizing the Attack
                                  Surface and Defenses in Software-Defined
                                  Networks . . . . . . . . . . . . . . . . 3514--3530
                Haipeng Dai and   
                Yunhuai Liu and   
                Guihai Chen and   
                Xiaobing Wu and   
                    Tian He and   
                Alex X. Liu and   
                     Huizhen Ma   Safe Charging for Wireless Power
                                  Transfer . . . . . . . . . . . . . . . . 3531--3544
                 Ruozhou Yu and   
               Guoliang Xue and   
                    Xiang Zhang   The Critical Network Flow Problem:
                                  Migratability and Survivability  . . . . 3545--3558
                    Ju Wang and   
                  Jie Xiong and   
               Hongbo Jiang and   
             Xiaojiang Chen and   
                    Dingyi Fang   D-Watch: Embracing ``Bad'' Multipaths
                                  for Device-Free Localization With COTS
                                  RFID Devices . . . . . . . . . . . . . . 3559--3572
                  Quan Chen and   
                   Hong Gao and   
                Siyao Cheng and   
               Xiaolin Fang and   
                Zhipeng Cai and   
                   Jianzhong Li   Centralized and Distributed
                                  Delay-Bounded Scheduling Algorithms for
                                  Multicast in Duty-Cycled Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 3573--3586
                  Hongli Xu and   
                Zhuolong Yu and   
                  Chen Qian and   
              Xiang-Yang Li and   
                 Zichun Liu and   
                 Liusheng Huang   Minimizing Flow Statistics Collection
                                  Cost Using Wildcard-Based Requests in
                                  SDNs . . . . . . . . . . . . . . . . . . 3587--3601
                   Xin Wang and   
           Richard T. B. Ma and   
                     Yinlong Xu   The Role of Data Cap in Optimal Two-Part
                                  Network Pricing  . . . . . . . . . . . . 3602--3615
               Xiaofeng Gao and   
                Zhiyin Chen and   
                     Fan Wu and   
                    Guihai Chen   Energy Efficient Algorithms for $k$-Sink
                                  Minimum Movement Target Coverage Problem
                                  in Mobile Sensor Network . . . . . . . . 3616--3627
          Alessandro Checco and   
                  Doug J. Leith   Fast, Responsive Decentralized Graph
                                  Coloring . . . . . . . . . . . . . . . . 3628--3640
        Avhishek Chatterjee and   
            Lav R. Varshney and   
              Sriram Vishwanath   Work Capacity of Regulated Freelance
                                  Platforms: Fundamental Limits and
                                  Decentralized Schemes  . . . . . . . . . 3641--3654
           Andreas Fiessler and   
               Claas Lorenz and   
                 Sven Hager and   
          Bjorn Scheuermann and   
                Andrew W. Moore   HyPaFilter+: Enhanced Hybrid Packet
                                  Filtering Using Hardware Assisted
                                  Classification and Header Space Analysis 3655--3669
          Mehrnoosh Shafiee and   
                  Javad Ghaderi   A Simple Congestion-Aware Algorithm for
                                  Load Balancing in Datacenter Networks    3670--3682
            Vaneet Aggarwal and   
        Yih-Farn Robin Chen and   
                   Tian Lan and   
                       Yu Xiang   Sprout: a Functional Caching Approach to
                                  Minimize Service Latency in
                                  Erasure-Coded Storage  . . . . . . . . . 3683--3694
              Andrea Munari and   
              Petri Mahonen and   
                 Marina Petrova   A Stochastic Geometry Approach to
                                  Asynchronous Aloha Full-Duplex Networks  3695--3708
                Faraz Ahmed and   
              Jeffrey Erman and   
                   Zihui Ge and   
                Alex X. Liu and   
                   Jia Wang and   
                         He Yan   Detecting and Localizing End-to-End
                                  Performance Degradation for Cellular
                                  Data Services Based on TCP Loss Ratio
                                  and Round Trip Time  . . . . . . . . . . 3709--3722
               Chaoli Zhang and   
                     Fan Wu and   
               Xiaofeng Gao and   
                    Guihai Chen   Free Talk in the Air: a Hierarchical
                                  Topology for 60 GHz Wireless Data Center
                                  Networks . . . . . . . . . . . . . . . . 3723--3737
               Qingjun Xiao and   
               Shigang Chen and   
                   You Zhou and   
                   Min Chen and   
                Junzhou Luo and   
                  Tengli Li and   
                     Yibei Ling   Cardinality Estimation for Elephant
                                  Flows: a Compact Solution Based on
                                  Virtual Register Sharing . . . . . . . . 3738--3752
               Jingyuan Fan and   
               Chaowen Guan and   
                    Kui Ren and   
                   Yong Cui and   
                  Chunming Qiao   SPABox: Safeguarding Privacy During Deep
                                  Packet Inspection at a MiddleBox . . . . 3753--3766
                Tingwei Zhu and   
                   Dan Feng and   
                  Fang Wang and   
                     Yu Hua and   
                 Qingyu Shi and   
                 Jiahao Liu and   
               Yongli Cheng and   
                       Yong Wan   Efficient Anonymous Communication in
                                  SDN-Based Data Center Networks . . . . . 3767--3780
             Xiaolong Zheng and   
               Jiliang Wang and   
          Longfei Shangguan and   
                  Zimu Zhou and   
                     Yunhao Liu   Design and Implementation of a CSI-Based
                                  Ubiquitous Smoking Detection System  . . 3781--3793
                    Kun Xie and   
                 Xiaocan Li and   
                   Xin Wang and   
                Gaogang Xie and   
                 Jigang Wen and   
               Jiannong Cao and   
                   Dafang Zhang   Fast Tensor Factorization for Accurate
                                  Internet Anomaly Detection . . . . . . . 3794--3807
                  Tao Zhang and   
               Jianxin Wang and   
               Jiawei Huang and   
                Jianer Chen and   
                     Yi Pan and   
                     Geyong Min   Tuning the Aggressive TCP Behavior for
                                  Highly Concurrent HTTP Connections in
                                  Intra-Datacenter . . . . . . . . . . . . 3808--3822
                   Lei Yang and   
                     Yao Li and   
             Qiongzheng Lin and   
                 Huanyu Jia and   
              Xiang-Yang Li and   
                     Yunhao Liu   Tagbeat: Sensing Mechanical Vibration
                                  Period With COTS RFID Systems  . . . . . 3823--3835
               Haiying Shen and   
                    Liuhua Chen   Distributed Autonomous Virtual Resource
                                  Management in Datacenters Using
                                  Finite-Markov Decision Process . . . . . 3836--3849
       Arsalan Sharifnassab and   
        S. Jamaloddin Golestani   On the Possibility of Network Scheduling
                                  With Polynomial Complexity and Delay . . 3850--3862
          Jesus Gomez-Vilardebo   Competitive Design of Energy Harvesting
                                  Communications in Wireless Fading
                                  Channels . . . . . . . . . . . . . . . . 3863--3872


IEEE\slash ACM Transactions on Networking
Volume 26, Number 1, February, 2018

               Haiyang Wang and   
                    Tong Li and   
                  Ryan Shea and   
               Xiaoqiang Ma and   
                  Feng Wang and   
             Jiangchuan Liu and   
                          Ke Xu   Toward Cloud-Based Distributed
                                  Interactive Applications: Measurement,
                                  Modeling, and Analysis . . . . . . . . . 3--16
             Falko Dressler and   
           Florian Klingler and   
           Christoph Sommer and   
                   Reuven Cohen   Not All VANET Broadcasts Are the Same:
                                  Context-Aware Class Based Broadcast  . . 17--30
          Cheng-Shang Chang and   
              Duan-Shin Lee and   
               Li-Heng Liou and   
               Sheng-Min Lu and   
                     Mu-Huan Wu   A Probabilistic Framework for Structural
                                  Analysis and Community Detection in
                                  Directed Networks  . . . . . . . . . . . 31--46
        Jelena Diakonikolas and   
                    Gil Zussman   On the Rate Regions of Single-Channel
                                  and Multi-Channel Full-Duplex Links  . . 47--60
     Antonios Michaloliakos and   
               Weng Chon Ao and   
       Konstantinos Psounis and   
                 Yonglong Zhang   Asynchronously Coordinated
                                  Multi-Timescale Beamforming Architecture
                                  for Multi-Cell Networks  . . . . . . . . 61--75
                Faraz Ahmed and   
           M. Zubair Shafiq and   
           Amir R. Khakpour and   
                    Alex X. Liu   Optimizing Internet Transit Routing for
                                  Content Delivery Networks  . . . . . . . 76--89
                Yongquan Fu and   
            Pere Barlet-Ros and   
                   Dongsheng Li   Every Timestamp Counts: Accurate
                                  Tracking of Network Latencies Using
                                  Reconcilable Difference Aggregator . . . 90--103
               Emad Alasadi and   
          Hamed S. Al-Raweshidy   SSED: Servers Under Software-Defined
                                  Network Architectures to Eliminate
                                  Discovery Messages . . . . . . . . . . . 104--117
                      Bo Li and   
                 Junfeng Wu and   
               Hongsheng Qi and   
        Alexandre Proutiere and   
                    Guodong Shi   Boolean Gossip Networks  . . . . . . . . 118--130
                  Ido Nevat and   
        Dinil Mon Divakaran and   
       Sai Ganesh Nagarajan and   
              Pengfei Zhang and   
                      Le Su and   
                 Li Ling Ko and   
           Vrizlynn L. L. Thing   Anomaly Detection and Attribution in
                                  Networks With Temporally Correlated
                                  Traffic  . . . . . . . . . . . . . . . . 131--144
                   Yong Cui and   
                Shihan Xiao and   
                   Xin Wang and   
               Zhenjie Yang and   
               Shenghui Yan and   
                   Chao Zhu and   
              Xiang-Yang Li and   
                        Ning Ge   Diamond: Nesting the Data Center Network
                                  With Wireless Rings in $3$-D Space . . . 145--160
                    Fu Xiao and   
              Zhongqin Wang and   
                    Ning Ye and   
               Ruchuan Wang and   
                  Xiang-Yang Li   One More Tag Enables Fine-Grained RFID
                                  Localization and Tracking  . . . . . . . 161--174
          David Gonzalez G. and   
               Harri Hakula and   
               Antti Rasila and   
                Jyri Hamalainen   Spatial Mappings for Planning and
                                  Optimization of Cellular Networks  . . . 175--188
                   Fei Chen and   
                Chunming Wu and   
               Xiaoyan Hong and   
                       Bin Wang   Easy Path Programming: Elevate
                                  Abstraction Level for Network Functions  189--202
           M. Saifur Rahman and   
     Md. Yusuf Sarwar Uddin and   
               Tahmid Hasan and   
            M. Sohel Rahman and   
                    M. Kaykobad   Using Adaptive Heartbeat Rate on
                                  Long-Lived TCP Connections . . . . . . . 203--216
                    Peng He and   
              Wenyuan Zhang and   
               Hongtao Guan and   
            Kave Salamatian and   
                    Gaogang Xie   Partial Order Theory for Fast TCAM
                                  Updates  . . . . . . . . . . . . . . . . 217--230
                    Lei Xie and   
                 Chuyu Wang and   
                Alex X. Liu and   
              Jianqiang Sun and   
                      Sanglu Lu   Multi-Touch in the Air: Concurrent
                                  Micromovement Recognition Using RF
                                  Signals  . . . . . . . . . . . . . . . . 231--244
           Truong Khoa Phan and   
              David Griffin and   
                Elisa Maini and   
                     Miguel Rio   Utility-Centric Networking: Balancing
                                  Transit Costs With Quality of Experience 245--258
           Matthew A. Clark and   
           Konstantinos Psounis   Trading Utility for Privacy in Shared
                                  Spectrum Access Systems  . . . . . . . . 259--273
               Qingxia Chen and   
              F. Richard Yu and   
                  Tao Huang and   
                Renchao Xie and   
                  Jiang Liu and   
                     Yunjie Liu   Joint Resource Allocation for
                                  Software-Defined Networking, Caching,
                                  and Computing  . . . . . . . . . . . . . 274--287
              Woong-Hee Lee and   
             Jeong-Sik Choi and   
               Yong-Hwa Kim and   
                Jong-Ho Lee and   
                Seong-Cheol Kim   Adaptive Sector Coloring Game for
                                  Geometric Network Information-Based
                                  Inter-Cell Interference Coordination in
                                  Wireless Cellular Networks . . . . . . . 288--301
            Giovanni Neglia and   
              Damiano Carra and   
               Pietro Michiardi   Cache Policies for Linear Utility
                                  Maximization . . . . . . . . . . . . . . 302--313
                Haipeng Dai and   
                 Huizhen Ma and   
                Alex X. Liu and   
                    Guihai Chen   Radiation Constrained Scheduling of
                                  Wireless Charging Tasks  . . . . . . . . 314--327
       Klaus-Tycho Foerster and   
                Arne Ludwig and   
           Jan Marcinkowski and   
                  Stefan Schmid   Loop-Free Route Updates for
                                  Software-Defined Networks  . . . . . . . 328--341
            Pavel Chuprikov and   
        Sergey I. Nikolenko and   
               Alex Davydow and   
                   Kirill Kogan   Priority Queueing for Packets With Two
                                  Characteristics  . . . . . . . . . . . . 342--355
   Daniela Aguirre-Guerrero and   
              Miguel Camelo and   
              Lluis Fabrega and   
                      Pere Vila   WMGR: a Generic and Compact Routing
                                  Scheme for Data Center Networks  . . . . 356--369
    Yasaman Keshtkarjahromi and   
            Hulya Seferoglu and   
              Rashid Ansari and   
                 Ashfaq Khokhar   Device-to-Device Networking Meets
                                  Cellular via Network Coding  . . . . . . 370--383
                  Yuan Yang and   
                 Mingwei Xu and   
                          Qi Li   Fast Rerouting Against Multi-Link
                                  Failures Without Topology Constraint . . 384--397
             Scott T. Rager and   
     Ertugrul N. Ciftcioglu and   
             Ram Ramanathan and   
         Thomas F. La Porta and   
                Ramesh Govindan   Scalability and Satisfiability of
                                  Quality-of-Information in Wireless
                                  Networks . . . . . . . . . . . . . . . . 398--411
                    Bei Liu and   
                   Wei Wang and   
               Donghyun Kim and   
                 Yingshu Li and   
              Sung-Sik Kwon and   
                   Yaolin Jiang   On Practical Construction of Quality
                                  Fault-Tolerant Virtual Backbone in
                                  Homogeneous Wireless Networks  . . . . . 412--421
               Carlo Fuerst and   
              Stefan Schmid and   
              Lalith Suresh and   
                    Paolo Costa   Kraken: Online and Elastic Resource
                                  Reservations for Cloud Datacenters . . . 422--435
               Ruiting Zhou and   
                Zongpeng Li and   
                       Chuan Wu   Scheduling Frameworks for Cloud
                                  Container Services . . . . . . . . . . . 436--450
              Luca Barletta and   
         Flaminio Borgonovo and   
               Ilario Filippini   The Throughput and Access Delay of
                                  Slotted-Aloha With Exponential Backoff   451--464
                Chi-Han Lin and   
               Yi-Ting Chen and   
          Kate Ching-Ju Lin and   
                 Wen-Tsuen Chen   FDoF: Enhancing Channel Utilization for
                                  802.11ac . . . . . . . . . . . . . . . . 465--477
                 Kechao Cai and   
                   Hong Xie and   
                 John C. S. Lui   Information Spreading Forensics via
                                  Sequential Dependent Snapshots . . . . . 478--491
                   Jie Zhao and   
                  Qiang Liu and   
                   Xin Wang and   
                     Shiwen Mao   Scheduling of Collaborative Sequential
                                  Compressed Sensing Over Wide Spectrum
                                  Band . . . . . . . . . . . . . . . . . . 492--505
             Abhishek Sinha and   
                  Eytan Modiano   Optimal Control for Generalized
                                  Network-Flow Problems  . . . . . . . . . 506--519
                Haipeng Dai and   
                Yunhuai Liu and   
                Guihai Chen and   
                Xiaobing Wu and   
                    Tian He and   
                Alex X. Liu and   
                      Yang Zhao   SCAPE: Safe Charging With Adjustable
                                  Power  . . . . . . . . . . . . . . . . . 520--533
             Peter Peresini and   
             Maciej Kuzniar and   
                   Dejan Kostic   Dynamic, Fine-Grained Data Plane
                                  Monitoring With Monocle  . . . . . . . . 534--547
              Andrea Araldo and   
                 Gyorgy Dan and   
                    Dario Rossi   Caching Encrypted Content Via Stochastic
                                  Cache Partitioning . . . . . . . . . . . 548--561
              Pengzhan Wang and   
                  Hongli Xu and   
             Liusheng Huang and   
                  Chen Qian and   
               Shaowei Wang and   
                    Yanjing Sun   Minimizing Controller Response Time
                                  Through Flow Redirecting in SDNs . . . . 562--575
                 Guang Yang and   
                  Ming Xiao and   
         Hussein Al-Zubaidy and   
             Yongming Huang and   
                    James Gross   Analysis of Millimeter-Wave Multi-Hop
                                  Networks With Full-Duplex Buffered
                                  Relays . . . . . . . . . . . . . . . . . 576--590
          Marcin Bienkowski and   
                Nadi Sarrar and   
              Stefan Schmid and   
                    Steve Uhlig   Online Aggregation of the Forwarding
                                  Information Base: Accounting for
                                  Locality and Churn . . . . . . . . . . . 591--604
                   Bin Tang and   
                  Shenghao Yang   An LDPC Approach for Chunked Network
                                  Codes  . . . . . . . . . . . . . . . . . 605--617
                  Hongli Xu and   
                   He Huang and   
               Shigang Chen and   
              Gongming Zhao and   
                 Liusheng Huang   Achieving High Scalability Through
                                  Hybrid Switching in Software-Defined
                                  Networking . . . . . . . . . . . . . . . 618--632
                   Luoyi Fu and   
                  Xinzhe Fu and   
                Zesen Zhang and   
                 Zhiying Xu and   
                  Xudong Wu and   
               Xinbing Wang and   
                      Songwu Lu   Joint Optimization of Multicast Energy
                                  in Delay-Constrained Mobile Wireless
                                  Networks . . . . . . . . . . . . . . . . 633--646

IEEE\slash ACM Transactions on Networking
Volume 26, Number 2, April, 2018

                Eric Norige and   
                Alex X. Liu and   
                 Eric Torng and   
                 Eric Torng and   
                Eric Norige and   
                    Alex X. Liu   A Ternary Unification Framework for
                                  Optimizing TCAM-Based Packet
                                  Classification Systems . . . . . . . . . 657--670
              Desheng Zhang and   
                    Tian He and   
                  Fan Zhang and   
              Chengzhong Xu and   
                    Tian He and   
                  Fan Zhang and   
              Desheng Zhang and   
                  Chengzhong Xu   Urban-Scale Human Mobility Modeling With
                                  Multi-Source Urban Network Data  . . . . 671--684
              Haichuan Ding and   
                  Chi Zhang and   
                Xuanheng Li and   
               Jianqing Liu and   
                   Miao Pan and   
               Yuguang Fang and   
               Shigang Chen and   
               Yuguang Fang and   
                  Chi Zhang and   
                   Miao Pan and   
                Xuanheng Li and   
               Jianqing Liu and   
              Haichuan Ding and   
                   Shigang Chen   Session-Based Cooperation in Cognitive
                                  Radio Networks: a Network-Level Approach 685--698
              Yongzheng Jia and   
                   Chuan Wu and   
                Zongpeng Li and   
                  Franck Le and   
                   Alex Liu and   
                Zongpeng Li and   
              Yongzheng Jia and   
                   Chuan Wu and   
                  Franck Le and   
                       Alex Liu   Online Scaling of NFV Service Chains
                                  Across Geo-Distributed Datacenters . . . 699--710
                 Yuxiao Hou and   
             Yuanqing Zheng and   
                 Yuxiao Hou and   
                 Yuanqing Zheng   PHY-Tree: Physical Layer Tree-Based RFID
                                  Identification . . . . . . . . . . . . . 711--723
                   Han Deng and   
                 I-Hong Hou and   
                 I-Hong Hou and   
                       Han Deng   Optimal Capacity Provisioning for Online
                                  Job Allocation With Hard Allocation
                                  Ratio Requirement  . . . . . . . . . . . 724--736
          Stratis Ioannidis and   
                 Edmund Yeh and   
                 Edmund Yeh and   
              Stratis Ioannidis   Adaptive Caching Networks With
                                  Optimality Guarantees  . . . . . . . . . 737--750
                   Wei Gong and   
               Haoxiang Liu and   
             Jiangchuan Liu and   
                 Xiaoyi Fan and   
                  Kebin Liu and   
                   Qiang Ma and   
                  Xiaoyu Ji and   
                  Kebin Liu and   
             Jiangchuan Liu and   
                 Xiaoyi Fan and   
                   Qiang Ma and   
               Haoxiang Liu and   
                   Wei Gong and   
                      Xiaoyu Ji   Channel-Aware Rate Adaptation for
                                  Backscatter Networks . . . . . . . . . . 751--764
                    Yue Cao and   
                Zhiyun Qian and   
              Zhongjie Wang and   
                   Tuan Dao and   
  Srikanth V. Krishnamurthy and   
             Lisa M. Marvel and   
                    Yue Cao and   
                   Tuan Dao and   
             Lisa M. Marvel and   
              Zhongjie Wang and   
                Zhiyun Qian and   
      Srikanth V. Krishnamurthy   Off-Path TCP Exploits of the Challenge
                                  ACK Global Rate Limit  . . . . . . . . . 765--778
               Tingjun Chen and   
              Javad Ghaderi and   
             Dan Rubenstein and   
                Gil Zussman and   
             Dan Rubenstein and   
               Tingjun Chen and   
              Javad Ghaderi and   
                    Gil Zussman   Maximizing Broadcast Throughput Under
                                  Ultra-Low-Power Constraints  . . . . . . 779--792
                    Kun Xie and   
                  Lele Wang and   
                   Xin Wang and   
                Gaogang Xie and   
                 Jigang Wen and   
            Guangxing Zhang and   
               Jiannong Cao and   
               Dafang Zhang and   
                    Kun Xie and   
                   Xin Wang and   
               Dafang Zhang and   
               Jiannong Cao and   
                  Lele Wang and   
                Gaogang Xie and   
                 Jigang Wen and   
                Guangxing Zhang   Accurate Recovery of Internet Traffic
                                  Data: a Sequential Tensor Completion
                                  Approach . . . . . . . . . . . . . . . . 793--806
                    Jian Du and   
                    Xue Liu and   
                    Lei Rao and   
                    Jian Du and   
                    Lei Rao and   
                        Xue Liu   Proactive Doppler Shift Compensation in
                                  Vehicular Cyber-Physical Systems . . . . 807--818
          Yoann Desmouceaux and   
             Pierre Pfister and   
              Jerome Tollet and   
              Mark Townsley and   
             Thomas Clausen and   
              Jerome Tollet and   
              Mark Townsley and   
          Yoann Desmouceaux and   
             Thomas Clausen and   
                 Pierre Pfister   6LB: Scalable and Application-Aware Load
                                  Balancing with Segment Routing . . . . . 819--834
          Anat Bremler-Barr and   
              Yotam Harchol and   
                  David Hay and   
               Yacov Hel-Or and   
              Yotam Harchol and   
          Anat Bremler-Barr and   
                  David Hay and   
                   Yacov Hel-Or   Encoding Short Ranges in TCAM Without
                                  Expansion: Efficient Algorithm and
                                  Applications . . . . . . . . . . . . . . 835--850
                  Jiayi Liu and   
               Qinghai Yang and   
              Gwendal Simon and   
                  Jiayi Liu and   
              Gwendal Simon and   
                   Qinghai Yang   Congestion Avoidance and Load Balancing
                                  in Content Placement and Request
                                  Redirection for Mobile CDN . . . . . . . 851--863
          Shiva Raj Pokhrel and   
           Carey Williamson and   
           Carey Williamson and   
              Shiva Raj Pokhrel   Modeling Compound TCP Over WiFi for IoT  864--878
        Avhishek Chatterjee and   
        Michael Borokhovich and   
            Lav R. Varshney and   
          Sriram Vishwanath and   
            Lav R. Varshney and   
        Avhishek Chatterjee and   
          Sriram Vishwanath and   
            Michael Borokhovich   Efficient and Flexible Crowdsourcing of
                                  Specialized Tasks With Precedence
                                  Constraints  . . . . . . . . . . . . . . 879--892
                 Xiaoqi Ren and   
               Palma London and   
                 Juba Ziani and   
               Adam Wierman and   
               Palma London and   
                 Juba Ziani and   
               Adam Wierman and   
                     Xiaoqi Ren   Datum: Managing Data Purchasing and Data
                                  Placement in a Geo-Distributed Data
                                  Market . . . . . . . . . . . . . . . . . 893--905
          Cheng-Shang Chang and   
              Duan-Shin Lee and   
                Chia-Kai Su and   
          Cheng-Shang Chang and   
                Chia-Kai Su and   
                  Duan-Shin Lee   Greenput: a Power-Saving Algorithm That
                                  Achieves Maximum Throughput in Wireless
                                  Networks . . . . . . . . . . . . . . . . 906--919
             Thomas Blasius and   
           Tobias Friedrich and   
              Anton Krohmer and   
                 Soren Laue and   
              Anton Krohmer and   
                 Soren Laue and   
           Tobias Friedrich and   
                 Thomas Blasius   Efficient Embedding of Scale-Free Graphs
                                  in the Hyperbolic Plane  . . . . . . . . 920--933
        Cory J. Kleinheksel and   
             Arun K. Somani and   
             Arun K. Somani and   
            Cory J. Kleinheksel   Enhancing Fault Tolerance and Resource
                                  Utilization in Unidirectional
                                  Quorum-Based Cycle Routing . . . . . . . 934--947
               Arsany Basta and   
              Andreas Blenk and   
              Szymon Dudycz and   
                Arne Ludwig and   
              Stefan Schmid and   
              Stefan Schmid and   
              Szymon Dudycz and   
              Andreas Blenk and   
                Arne Ludwig and   
                   Arsany Basta   Efficient Loop-Free Rerouting of
                                  Multiple SDN Flows . . . . . . . . . . . 948--961
                     Bo Yan and   
                    Yang Xu and   
           H. Jonathan Chao and   
           H. Jonathan Chao and   
                    Yang Xu and   
                         Bo Yan   Adaptive Wildcard Rule Cache Management
                                  for Software-Defined Networks  . . . . . 962--975
              Jhih-Yu Huang and   
              Pi-Chung Wang and   
              Jhih-Yu Huang and   
                  Pi-Chung Wang   TCAM-Based IP Address Lookup Using
                                  Longest Suffix Split . . . . . . . . . . 976--989
               Xiaofeng Gao and   
                 Jiahao Fan and   
                     Fan Wu and   
                Guihai Chen and   
                 Jiahao Fan and   
                Guihai Chen and   
               Xiaofeng Gao and   
                         Fan Wu   Approximation Algorithms for Sweep
                                  Coverage Problem With Multiple Mobile
                                  Sensors  . . . . . . . . . . . . . . . . 990--1003
             Sheng-Chun Kao and   
              Ding-Yuan Lee and   
            Ting-Sheng Chen and   
                  An-Yeu Wu and   
             Sheng-Chun Kao and   
              Ding-Yuan Lee and   
                  An-Yeu Wu and   
                Ting-Sheng Chen   Dynamically Updatable Ternary Segmented
                                  Aging Bloom Filter for
                                  OpenFlow-Compliant Low-Power Packet
                                  Processing . . . . . . . . . . . . . . . 1004--1017
               Hongbo Jiang and   
                  Ping Zhao and   
                  Chen Wang and   
                  Chen Wang and   
               Hongbo Jiang and   
                      Ping Zhao   RobLoP: Towards Robust Privacy
                                  Preserving Against Location Dependent
                                  Attacks in Continuous LBS Queries  . . . 1018--1032
                     Ye Liu and   
            Chung Shue Chen and   
               Chi Wan Sung and   
          Chandramani Singh and   
                     Ye Liu and   
               Chi Wan Sung and   
            Chung Shue Chen and   
              Chandramani Singh   Corrections to ``A Game Theoretic
                                  Distributed Algorithm for FeICIC
                                  Optimization in LTE-A HetNets''  . . . . 1033--1033

IEEE\slash ACM Transactions on Networking
Volume 26, Number 3, June, 2018

                    Qian Ma and   
                    Lin Gao and   
                Ya-Feng Liu and   
                  Jianwei Huang   Incentivizing Wi-Fi Network
                                  Crowdsourcing: a Contract Theoretic
                                  Approach . . . . . . . . . . . . . . . . 1035--1048
                 Ying Zhang and   
                   Lei Deng and   
               Minghua Chen and   
                   Peijian Wang   Joint Bidding and Geographical Load
                                  Balancing for Datacenters: Is
                                  Uncertainty a Blessing or a Curse? . . . 1049--1062
                Soumya Basu and   
         Aditya Sundarrajan and   
              Javad Ghaderi and   
          Sanjay Shakkottai and   
               Ramesh Sitaraman   Adaptive TTL-Based Caching for Content
                                  Delivery . . . . . . . . . . . . . . . . 1063--1077
                     Li Yan and   
               Haiying Shen and   
                      Kang Chen   MobiT: Distributed and
                                  Congestion-Resilient Trajectory-Based
                                  Routing for Vehicular Delay Tolerant
                                  Networks . . . . . . . . . . . . . . . . 1078--1091
                   Luoyi Fu and   
                 Songjun Ma and   
               Lingkun Kong and   
                Shiyu Liang and   
                   Xinbing Wang   FINE: a Framework for Distributed
                                  Learning on Incomplete Observations for
                                  Heterogeneous Crowdsensing Networks  . . 1092--1109
               Jose Yallouz and   
          Ori Rottenstreich and   
             Peter Babarczi and   
              Avi Mendelson and   
                     Ariel Orda   Minimum-Weight Link-Disjoint
                                  Node-``Somewhat Disjoint'' Paths . . . . 1110--1122
                  Gang Wang and   
                 Bolun Wang and   
                Tianyi Wang and   
                   Ana Nika and   
               Haitao Zheng and   
                    Ben Y. Zhao   Ghost Riders: Sybil Attacks on
                                  Crowdsourced Mobile Mapping Services . . 1123--1136
                    Kun Xie and   
                   Can Peng and   
                   Xin Wang and   
                Gaogang Xie and   
                 Jigang Wen and   
               Jiannong Cao and   
               Dafang Zhang and   
                      Zheng Qin   Accurate Recovery of Internet Traffic
                                  Data Under Variable Rate Measurements    1137--1150
                      Ye Yu and   
         Djamal Belazzougui and   
                  Chen Qian and   
                      Qin Zhang   Memory-Efficient and Ultra-Fast Network
                                  Lookup and Forwarding Using Othello
                                  Hashing  . . . . . . . . . . . . . . . . 1151--1164
               Gil Einziger and   
              Benny Fellman and   
               Roy Friedman and   
                  Yaron Kassner   ICE Buckets: Improved Counter Estimation
                                  for Network Measurement  . . . . . . . . 1165--1178
            Carlee Joe-Wong and   
                 Soumya Sen and   
                     Sangtae Ha   Sponsoring Mobile Data: Analyzing the
                                  Impact on Internet Stakeholders  . . . . 1179--1192
                  Wenxin Li and   
                Xiaobo Zhou and   
                   Keqiu Li and   
                    Heng Qi and   
                       Deke Guo   TrafficShaper: Shaping Inter-Datacenter
                                  Traffic to Reduce the Transmission Cost  1193--1206
               Haiying Shen and   
                    Liuhua Chen   Resource Demand Misalignment: an
                                  Important Factor to Consider for
                                  Reducing Resource Over-Provisioning in
                                  Cloud Datacenters  . . . . . . . . . . . 1207--1221
                    Kun Xie and   
                 Xiaocan Li and   
                   Xin Wang and   
               Jiannong Cao and   
                Gaogang Xie and   
                 Jigang Wen and   
               Dafang Zhang and   
                      Zheng Qin   On-Line Anomaly Detection With High
                                  Accuracy . . . . . . . . . . . . . . . . 1222--1235
               Xiaocong Jin and   
                  Yanchao Zhang   Privacy-Preserving Crowdsourced Spectrum
                                  Sensing  . . . . . . . . . . . . . . . . 1236--1249
                  Mate Nagy and   
             Janos Tapolcai and   
                  Gabor Retvari   Node Virtualization for IP Level
                                  Resilience . . . . . . . . . . . . . . . 1250--1263
                  Yitu Wang and   
                   Wei Wang and   
                   Ying Cui and   
               Kang G. Shin and   
                 Zhaoyang Zhang   Distributed Packet Forwarding and
                                  Caching Based on Stochastic Network
                                  Utility Maximization . . . . . . . . . . 1264--1277
                Dongxiao Yu and   
                  Yifei Zou and   
                   Jiguo Yu and   
              Xiuzhen Cheng and   
            Qiang-Sheng Hua and   
                    Hai Jin and   
              Francis C. M. Lau   Stable Local Broadcast in Multihop
                                  Wireless Networks Under SINR . . . . . . 1278--1291
               Marco Chiesa and   
              Gabor Retvari and   
               Michael Schapira   Oblivious Routing in IP Networks . . . . 1292--1305
          Talha Cihad Gulcu and   
       Vaggos Chatziafratis and   
              Yingrui Zhang and   
                    Osman Yagan   Attack Vulnerability of Power Systems
                                  Under an Equal Load Redistribution Model 1306--1319
               Nicolas Huin and   
           Brigitte Jaumard and   
               Frederic Giroire   Optimal Network Service Chain
                                  Provisioning . . . . . . . . . . . . . . 1320--1333
    Sabrina Klos nee Muller and   
                  Cem Tekin and   
     Mihaela van der Schaar and   
                     Anja Klein   Context-Aware Hierarchical Online
                                  Learning for Performance Maximization in
                                  Mobile Crowdsourcing . . . . . . . . . . 1334--1347
               Haiying Shen and   
                    Liuhua Chen   CompVM: a Complementary VM Allocation
                                  Mechanism for Cloud Systems  . . . . . . 1348--1361
             Xingliang Yuan and   
                 Huayi Duan and   
                      Cong Wang   Assuring String Pattern Matching in
                                  Outsourced Middleboxes . . . . . . . . . 1362--1375
                   Guo Chen and   
                 Yuanwei Lu and   
                  Yuan Meng and   
                   Bojie Li and   
                    Kun Tan and   
                    Dan Pei and   
                 Peng Cheng and   
                 Layong Luo and   
            Yongqiang Xiong and   
             Xiaoliang Wang and   
                   Youjian Zhao   FUSO: Fast Multi-Path Loss Recovery for
                                  Data Center Networks . . . . . . . . . . 1376--1389
  Guillaume Artero Gallardo and   
           Gentian Jakllari and   
          Lucile Canourgues and   
               Andre-Luc Beylot   Statistical Admission Control in
                                  Multi-Hop Cognitive Radio Networks . . . 1390--1403
               Marton Sipos and   
                  Josh Gahm and   
             Narayan Venkat and   
                      Dave Oran   Network-Aware Feasible Repairs for
                                  Erasure-Coded Storage  . . . . . . . . . 1404--1417
                   Tao Zhao and   
                  Korok Ray and   
                     I-Hong Hou   A Non-Monetary Mechanism for Optimal
                                  Rate Control Through Efficient Cost
                                  Allocation . . . . . . . . . . . . . . . 1418--1431
                     Fan Wu and   
                  Tong Meng and   
                  Aijing Li and   
                Guihai Chen and   
                Nitin H. Vaidya   Have You Recorded My Voice: Toward
                                  Robust Neighbor Discovery in Mobile
                                  Wireless Networks  . . . . . . . . . . . 1432--1445
                    Zhen Tu and   
                  Fengli Xu and   
                    Yong Li and   
               Pengyu Zhang and   
                     Depeng Jin   A New Privacy Breach: User Trajectory
                                  Recovery From Aggregated Mobility Data   1446--1459
                 Huikang Li and   
                     Yi Gao and   
                   Wei Dong and   
                      Chun Chen   Taming Both Predictable and
                                  Unpredictable Link Failures for Network
                                  Tomography . . . . . . . . . . . . . . . 1460--1473
           Sherif ElAzzouni and   
                    Eylem Ekici   Node-Based Distributed Channel Access
                                  With Enhanced Delay Characteristics  . . 1474--1487
                  Chen Tian and   
                  Ali Munir and   
                Alex X. Liu and   
                   Jie Yang and   
                  Yangming Zhao   OpenFunction: an Extensible Data Plane
                                  Abstraction Protocol for
                                  Platform-Independent Software-Defined
                                  Middleboxes  . . . . . . . . . . . . . . 1488--1501
            Beatriz Lorenzo and   
      Alireza Shams Shafigh and   
               Jianqing Liu and   
Francisco J. Gonzalez-Castano and   
                   Yuguang Fang   Data and Spectrum Trading Policies in a
                                  Trusted Cognitive Dynamic Network
                                  Architecture . . . . . . . . . . . . . . 1502--1516
                 Kaikai Liu and   
                     Xiaolin Li   Enhancing Localization Scalability and
                                  Accuracy via Opportunistic Sensing . . . 1517--1530
                   Lei Jiao and   
       Antonia Maria Tulino and   
               Jaime Llorca and   
                    Yue Jin and   
                Alessandra Sala   Corrections to ``Smoothed Online
                                  Resource Allocation in Multi-Tier
                                  Distributed Cloud Networks'' . . . . . . 1531--1531

IEEE\slash ACM Transactions on Networking
Volume 26, Number 4, August, 2018

               Danfeng Shan and   
                   Fengyuan Ren   ECN Marking With Micro-Burst Traffic:
                                  Problem, Analysis, and Improvement . . . 1533--1546
     Sajad Shirali-Shahreza and   
                 Yashar Ganjali   Delayed Installation and Expedited
                                  Eviction: an Alternative Approach to
                                  Reduce Flow Table Occupancy in SDN
                                  Switches . . . . . . . . . . . . . . . . 1547--1561
               Tung-Wei Kuo and   
             Bang-Heng Liou and   
          Kate Ching-Ju Lin and   
                  Ming-Jer Tsai   Deploying Chains of Virtual Network
                                  Functions: On the Relation Between Link
                                  and Server Usage . . . . . . . . . . . . 1562--1576
        Apostolos Destounis and   
              Stefano Paris and   
              Lorenzo Maggi and   
        Georgios S. Paschos and   
                 Jeremie Leguay   Minimum Cost SDN Routing With
                                  Reconfiguration Frequency Constraints    1577--1590
                      Yu Ma and   
                Weifa Liang and   
                    Wenzheng Xu   Charging Utility Maximization in
                                  Wireless Rechargeable Sensor Networks by
                                  Charging Multiple Sensors Simultaneously 1591--1604
                     Hao Yu and   
               Michael J. Neely   A New Backpressure Algorithm for Joint
                                  Rate Control and Routing With Vanishing
                                  Utility Optimality Gaps and Finite Queue
                                  Lengths  . . . . . . . . . . . . . . . . 1605--1618
                Lixing Chen and   
                 Sheng Zhou and   
                         Jie Xu   Computation Peer Offloading for
                                  Energy-Constrained Mobile Edge Computing
                                  in Small-Cell Networks . . . . . . . . . 1619--1632
               Anis Elgabli and   
            Vaneet Aggarwal and   
                  Shuai Hao and   
                  Feng Qian and   
                 Subhabrata Sen   LBP: Robust Rate Adaptation Algorithm
                                  for SVC Video Streaming  . . . . . . . . 1633--1645
              Jianping Weng and   
            Jessie Hui Wang and   
                Jiahai Yang and   
                           Yang   Root Cause Analysis of Anomalies of
                                  Multitier Services in Public Clouds  . . 1646--1659
               Jiangbo Qian and   
              Zhipeng Huang and   
                  Qiang Zhu and   
                    Huahui Chen   Hamming Metric Multi-Granularity
                                  Locality-Sensitive Bloom Filter  . . . . 1660--1673
          Mehrnoosh Shafiee and   
                  Javad Ghaderi   An Improved Bound for Minimizing the
                                  Total Weighted Completion Time of
                                  Coflows in Datacenters . . . . . . . . . 1674--1687
                Pengjin Xie and   
              Jingchao Feng and   
                Zhichao Cao and   
                   Jiliang Wang   GeneWave: Fast Authentication and Key
                                  Agreement on Commodity Mobile Devices    1688--1700
                    Fu Xiao and   
                   Lei Chen and   
               Chaoheng Sha and   
                 Lijuan Sun and   
               Ruchuan Wang and   
                Alex X. Liu and   
                    Faraz Ahmed   Noise Tolerant Localization for Sensor
                                  Networks . . . . . . . . . . . . . . . . 1701--1714
                      Qi Li and   
                 Yanyu Chen and   
          Patrick P. C. Lee and   
                 Mingwei Xu and   
                        Kui Ren   Security Policy Violations in SDN Data
                                  Plane  . . . . . . . . . . . . . . . . . 1715--1727
                    Kai Han and   
                   He Huang and   
                        Jun Luo   Quality-Aware Pricing for Mobile
                                  Crowdsensing . . . . . . . . . . . . . . 1728--1741
               Jingyuan Fan and   
               Chaowen Guan and   
                    Kui Ren and   
                  Chunming Qiao   Middlebox-Based Packet-Level Redundancy
                                  Elimination Over Encrypted Network
                                  Traffic  . . . . . . . . . . . . . . . . 1742--1753
             Tatsuya Otoshi and   
              Yuichi Ohsita and   
            Masayuki Murata and   
          Yousuke Takahashi and   
          Keisuke Ishibashi and   
             Kohei Shiomoto and   
              Tomoaki Hashimoto   Hierarchical Model Predictive Traffic
                                  Engineering  . . . . . . . . . . . . . . 1754--1767
            Ping-Chun Hsieh and   
                     I-Hong Hou   Heavy-Traffic Analysis of QoE Optimality
                                  for On-Demand Video Streams Over Fading
                                  Channels . . . . . . . . . . . . . . . . 1768--1781
           Ravi Kumar Kolla and   
        Krishna Jagannathan and   
                 Aditya Gopalan   Collaborative Learning of Stochastic
                                  Bandits Over a Social Network  . . . . . 1782--1795
   Peruru Subrahmanya Swamy and   
 Venkata Pavan Kumar Bellam and   
        Radha Krishna Ganti and   
            Krishna Jagannathan   Efficient CSMA Using Regional Free
                                  Energy Approximations  . . . . . . . . . 1796--1809
               Longbo Huang and   
               Minghua Chen and   
                     Yunxin Liu   Learning-Aided Stochastic Network
                                  Optimization With State Prediction . . . 1810--1820
                  Tong Yang and   
                Gaogang Xie and   
                Alex X. Liu and   
                 Qiaobin Fu and   
                 Yanbiao Li and   
                Xiaoming Li and   
                  Laurent Mathy   Constant IP Lookup With FIB Explosion    1821--1836
              Gongming Zhao and   
                  Hongli Xu and   
               Shigang Chen and   
             Liusheng Huang and   
                  Pengzhan Wang   Joint Optimization of Flow Table and
                                  Group Table for Default Paths in SDNs    1837--1850
             Timmy Schuller and   
           Nils Aschenbruck and   
             Markus Chimani and   
           Martin Horneffer and   
               Stefan Schnitter   Traffic Engineering Using Segment
                                  Routing and Considering Requirements of
                                  a Carrier IP Network . . . . . . . . . . 1851--1864
                Haipeng Dai and   
                Xiaoyu Wang and   
                Alex X. Liu and   
                 Huizhen Ma and   
                Guihai Chen and   
                    Wanchun Dou   Wireless Charger Placement for
                                  Directional Charging . . . . . . . . . . 1865--1878
            Sebastien Henri and   
          Christina Vlachou and   
                 Patrick Thiran   Multi-Armed Bandit in Action: Optimizing
                                  Performance in Dynamic Hybrid Networks   1879--1892
        Abusayeed Saifullah and   
            Mahbubur Rahman and   
                Dali Ismail and   
                Chenyang Lu and   
                    Jie Liu and   
                Ranveer Chandra   Low-Power Wide-Area Network Over White
                                  Spaces . . . . . . . . . . . . . . . . . 1893--1906
Sorrachai Yingchareonthawornchai and   
                 James Daly and   
                Alex X. Liu and   
                     Eric Torng   A Sorted-Partitioning Approach to Fast
                                  and Scalable Dynamic Packet
                                  Classification . . . . . . . . . . . . . 1907--1920
       Abubakr O. Al-Abbasi and   
                Vaneet Aggarwal   Video Streaming in Distributed
                                  Erasure-Coded Storage Systems: Stall
                                  Duration Analysis  . . . . . . . . . . . 1921--1932
                    Ning Li and   
Jose-Fernan Martinez-Ortega and   
     Vicente Hernandez Diaz and   
 Jose Antonio Sanchez Fernandez   Probability Prediction-Based Reliable
                                  and Efficient Opportunistic Routing
                                  Algorithm for VANETs . . . . . . . . . . 1933--1947
                Zhuotao Liu and   
                    Hao Jin and   
                Yih-Chun Hu and   
                 Michael Bailey   Practical Proactive DDoS-Attack
                                  Mitigation via Endpoint-Driven
                                  In-Network Traffic Control . . . . . . . 1948--1961
                  Shuo Wang and   
                 Jiao Zhang and   
                  Tao Huang and   
                   Tian Pan and   
                  Jiang Liu and   
                     Yunjie Liu   Multi-Attributes-Based Coflow Scheduling
                                  Without Prior Knowledge  . . . . . . . . 1962--1975
                Xueying Guo and   
                Rahul Singh and   
                P. R. Kumar and   
                   Zhisheng Niu   A Risk-Sensitive Approach for Packet
                                  Inter-Delivery Time Optimization in
                                  Networked Cyber-Physical Systems . . . . 1976--1989
          Morteza Mehrnoush and   
              Vanlin Sathya and   
                  Sumit Roy and   
                  Monisha Ghosh   Analytical Modeling of Wi-Fi and LTE-LAA
                                  Coexistence: Throughput and Impact of
                                  Energy Detection Threshold . . . . . . . 1990--2003

IEEE\slash ACM Transactions on Networking
Volume 26, Number 5, October, 2018

              Simone Ferlin and   
              Stepan Kucera and   
            Holger Claussen and   
                      Ozgu Alay   MPTCP Meets FEC: Supporting
                                  Latency-Sensitive Applications Over
                                  Heterogeneous Networks . . . . . . . . . 2005--2018
                Haiming Jin and   
                      Lu Su and   
               Houping Xiao and   
                Klara Nahrstedt   Incentive Mechanism for Privacy-Aware
                                  Data Aggregation in Mobile Crowd Sensing
                                  Systems  . . . . . . . . . . . . . . . . 2019--2032
                   Ying Cui and   
              Muriel Medard and   
                 Edmund Yeh and   
              Douglas Leith and   
                   Ken R. Duffy   Optimization-Based Linear Network Coding
                                  for General Connections of Continuous
                                  Flows  . . . . . . . . . . . . . . . . . 2033--2047
               Haifeng Zhou and   
                Chunming Wu and   
               Chengyu Yang and   
               Pengfei Wang and   
                    Qi Yang and   
                 Zhouhao Lu and   
                   Qiumei Cheng   SDN--RDCD: a Real-Time and Reliable
                                  Method for Detecting Compromised SDN
                                  Devices  . . . . . . . . . . . . . . . . 2048--2061
                  Ming Tang and   
               Haitian Pang and   
                  Shou Wang and   
                    Lin Gao and   
              Jianwei Huang and   
                     Lifeng Sun   Multi-Dimensional Auction Mechanisms for
                                  Crowdsourced Mobile Video Streaming  . . 2062--2075
     Christopher G. Brinton and   
         Swapna Buccapatnam and   
                Liang Zheng and   
                     Da Cao and   
              Andrew S. Lan and   
           Felix M. F. Wong and   
                 Sangtae Ha and   
                Mung Chiang and   
                H. Vincent Poor   On the Efficiency of Online Social
                                  Learning Networks  . . . . . . . . . . . 2076--2089
               Jianan Zhang and   
                  Eytan Modiano   Connectivity in Interdependent Networks  2090--2103
                 Yifei Yuan and   
                   Dong Lin and   
                  Siri Anil and   
                Harsh Verma and   
           Anirudh Chelluri and   
                Rajeev Alur and   
                  Boon Thau Loo   NetEgg: a Scenario-Based Programming
                                  Toolkit for SDN Policies . . . . . . . . 2104--2117
                   Hao Feng and   
               Jaime Llorca and   
          Antonia M. Tulino and   
             Andreas F. Molisch   Optimal Dynamic Cloud Network Control    2118--2131
                  Yifei Zhu and   
              Silvery D. Fu and   
             Jiangchuan Liu and   
                       Yong Cui   Truthful Online Auction Toward Maximized
                                  Instance Utilization in the Cloud  . . . 2132--2145
                    Lei Xie and   
              Qingliang Cai and   
                Alex X. Liu and   
                   Wei Wang and   
                 Yafeng Yin and   
                      Sanglu Lu   Synchronize Inertial Readings From
                                  Multiple Mobile Devices in Spatial
                                  Dimension  . . . . . . . . . . . . . . . 2146--2159
             Satyam Agarwal and   
                      Swades De   Rural Broadband Access via Clustered
                                  Collaborative Communication  . . . . . . 2160--2173
               Seongmin Kim and   
                Juhyeng Han and   
               Jaehyeong Ha and   
                 Taesoo Kim and   
                     Dongsu Han   SGX-Tor: a Secure and Practical Tor
                                  Anonymity Network With SGX Enclaves  . . 2174--2187
               Robert Soule and   
            Shrutarshi Basu and   
      Parisa Jalili Marandi and   
            Fernando Pedone and   
           Robert Kleinberg and   
             Emin Gun Sirer and   
                    Nate Foster   Merlin: a Language for Managing Network
                                  Resources  . . . . . . . . . . . . . . . 2188--2201
       Konstantinos Psychas and   
                  Javad Ghaderi   Randomized Algorithms for Scheduling
                                  Multi-Resource Jobs in the Cloud . . . . 2202--2215
           Leonardo Maccari and   
                Renato Lo Cigno   Improving Routing Convergence With
                                  Centrality: Theory and Implementation of
                                  Pop-Routing  . . . . . . . . . . . . . . 2216--2229
                Zhemin Qian and   
                  Fujie Fan and   
                    Bing Hu and   
              Kwan L. Yeung and   
                       Liyan Li   Global Round Robin: Efficient Routing
                                  With Cut-Through Switching in Fat-Tree
                                  Data Center Networks . . . . . . . . . . 2230--2241
               Tianyuan Sun and   
               Yongcai Wang and   
                  Deying Li and   
                Zhaoquan Gu and   
                         Jia Xu   WCS: Weighted Component Stitching for
                                  Sparse Network Localization  . . . . . . 2242--2253
                Jianyuan Lu and   
                  Tong Yang and   
                    Yi Wang and   
                Huichen Dai and   
                    Xi Chen and   
                Linxiao Jin and   
                 Haoyu Song and   
                        Bin Liu   Low Computational Cost Bloom Filters . . 2254--2267
        Monireh Dabaghchian and   
         Amir Alipour-Fanid and   
                   Kai Zeng and   
                Qingsi Wang and   
                     Peter Auer   Online Learning With Randomized Feedback
                                  Graphs for Optimal PUE Attacks in
                                  Cognitive Radio Networks . . . . . . . . 2268--2281
                  Anfu Zhou and   
                   Teng Wei and   
                Xinyu Zhang and   
                     Huadong Ma   FastND: Accelerating Directional
                                  Neighbor Discovery for 60-GHz
                                  Millimeter-Wave Wireless Networks  . . . 2282--2295
                Li-On Raviv and   
                    Amir Leshem   Maximizing Service Reward for Queues
                                  With Deadlines . . . . . . . . . . . . . 2296--2308
                Chunpu Wang and   
                  Chen Feng and   
                   Julian Cheng   Distributed Join-the-Idle-Queue for Low
                                  Latency Cloud Services . . . . . . . . . 2309--2319
             Yonglong Zhang and   
           Konstantinos Psounis   Consistently High MIMO Rates via
                                  Switched-Beam Antennas . . . . . . . . . 2320--2333
          Neminath Hubballi and   
                Mayank Swarnkar   BitCoding: Network Traffic
                                  Classification Through Encoded Bit Level
                                  Signatures . . . . . . . . . . . . . . . 2334--2346
                  Quan Chen and   
                   Hong Gao and   
                Zhipeng Cai and   
             Lianglun Cheng and   
                   Jianzhong Li   Distributed Low-Latency Data Aggregation
                                  for Duty-Cycle Wireless Sensor Networks  2347--2360
     Vincenzo Sciancalepore and   
           Ilario Filippini and   
           Vincenzo Mancuso and   
             Antonio Capone and   
                  Albert Banchs   A Multi-Traffic Inter-Cell Interference
                                  Coordination Scheme in Dense Cellular
                                  Networks . . . . . . . . . . . . . . . . 2361--2375
                 Xiong Wang and   
             Mehdi Malboubi and   
                 Zhihao Pan and   
                   Jing Ren and   
                 Sheng Wang and   
                Shizhong Xu and   
                 Chen-Nee Chuah   ProgLIMI: Programmable LInk Metric
                                  Identification in Software-Defined
                                  Networks . . . . . . . . . . . . . . . . 2376--2389
         Yasaman Ghasempour and   
     Muhammad Kumail Haider and   
             Edward W. Knightly   Decoupling Beam Steering and User
                                  Selection for MU--MIMO 60-GHz WLANs  . . 2390--2403
                 Zhao Zhang and   
                   Weili Wu and   
                  Jing Yuan and   
                    Ding-Zhu Du   Breach-Free Sleep-Wakeup Scheduling for
                                  Barrier Coverage With Heterogeneous
                                  Wireless Sensors . . . . . . . . . . . . 2404--2413
                 Mengyao Ge and   
              Douglas M. Blough   High Throughput and Fair Scheduling for
                                  Multi-AP Multiuser MIMO in Dense
                                  Wireless Networks  . . . . . . . . . . . 2414--2427

IEEE\slash ACM Transactions on Networking
Volume 26, Number 6, December, 2018

                Haipeng Dai and   
           Muhammad Shahzad and   
                Alex X. Liu and   
                    Meng Li and   
              Yuankun Zhong and   
                    Guihai Chen   Identifying and Estimating Persistent
                                  Items in Data Streams  . . . . . . . . . 2429--2442
                    Ning Wu and   
                 Yingjie Bi and   
             Nithin Michael and   
                    Ao Tang and   
              John C. Doyle and   
                  Nikolai Matni   A Control-Theoretic Approach to
                                  In-Network Congestion Management . . . . 2443--2456
                   Kun Chen and   
                   Longbo Huang   Timely-Throughput Optimal Scheduling
                                  With Prediction  . . . . . . . . . . . . 2457--2470
           Pavlos Sermpezis and   
         Vasileios Kotronis and   
               Petros Gigis and   
   Xenofontas Dimitropoulos and   
            Danilo Cicalese and   
              Alistair King and   
               Alberto Dainotti   ARTEMIS: Neutralizing BGP Hijacking
                                  Within a Minute  . . . . . . . . . . . . 2471--2486
               Gek Hong Sim and   
               Sabrina Klos and   
                Arash Asadi and   
                 Anja Klein and   
               Matthias Hollick   An Online Context-Aware Machine Learning
                                  Algorithm for $5$G mmWave Vehicular
                                  Communications . . . . . . . . . . . . . 2487--2500
     Subhashini Krishnasamy and   
                P. T. Akhil and   
           Ari Arapostathis and   
          Rajesh Sundaresan and   
              Sanjay Shakkottai   Augmenting Max-Weight With Explicit
                                  Learning for Wireless Scheduling With
                                  Switching Costs  . . . . . . . . . . . . 2501--2514
                     Yi Gao and   
                  Yuan Jing and   
                       Wei Dong   UniROPE: Universal and Robust Packet
                                  Trajectory Tracing for Software-Defined
                                  Networks . . . . . . . . . . . . . . . . 2515--2527
              Jiaxiao Zheng and   
            Pablo Caballero and   
         Gustavo de Veciana and   
             Seung Jun Baek and   
                  Albert Banchs   Statistical Multiplexing and Traffic
                                  Shaping Games for Network Slicing  . . . 2528--2541
                 Yuanjie Li and   
                Chunyi Peng and   
               Haotian Deng and   
               Zengwen Yuan and   
                Guan-Hua Tu and   
                  Jiayao Li and   
                  Songwu Lu and   
                          Xi Li   Device-Customized Multi-Carrier Network
                                  Access on Commodity Smartphones  . . . . 2542--2555
               Changhee Joo and   
                Atilla Eryilmaz   Wireless Scheduling for Information
                                  Freshness and Synchrony: Drift-Based
                                  Design and Heavy-Traffic Analysis  . . . 2556--2568
                Arne Ludwig and   
              Szymon Dudycz and   
              Matthias Rost and   
                  Stefan Schmid   Transiently Policy-Compliant Network
                                  Updates  . . . . . . . . . . . . . . . . 2569--2582
        Michael Borokhovich and   
       Yvonne-Anne Pignolet and   
              Stefan Schmid and   
                  Gilles Tredan   Load-Optimal Local Fast Rerouting for
                                  Dense Networks . . . . . . . . . . . . . 2583--2597
              Haichuan Ding and   
                Xuanheng Li and   
                   Ying Cai and   
            Beatriz Lorenzo and   
                   Yuguang Fang   Intelligent Data Transportation in Smart
                                  Cities: a Spectrum-Aware Approach  . . . 2598--2611
               Reuven Cohen and   
                Evgeny Moroshko   Sampling-on-Demand in SDN  . . . . . . . 2612--2622
                Gourav Saha and   
      Alhussein A. Abouzeid and   
          Marja Matinmikko-Blue   Online Algorithm for Leasing Wireless
                                  Channels in a Three-Tier Spectrum
                                  Sharing Framework  . . . . . . . . . . . 2623--2636
                Igor Kadota and   
             Abhishek Sinha and   
       Elif Uysal-Biyikoglu and   
                Rahul Singh and   
                  Eytan Modiano   Scheduling Policies for Minimizing Age
                                  of Information in Broadcast Wireless
                                  Networks . . . . . . . . . . . . . . . . 2637--2650
               Fengxian Guo and   
                 Heli Zhang and   
                    Hong Ji and   
                      Xi Li and   
             Victor C. M. Leung   An Efficient Computation Offloading
                                  Management Scheme in the Densely
                                  Deployed Small Cell Networks With Mobile
                                  Edge Computing . . . . . . . . . . . . . 2651--2664
     Andres Garcia-Saavedra and   
                Paul Patras and   
               Victor Valls and   
         Xavier Costa-Perez and   
               Douglas J. Leith   ORLA/OLAA: Orthogonal Coexistence of LAA
                                  and WiFi in Unlicensed Spectrum  . . . . 2665--2678
        Aakanksha Chowdhery and   
                  Kyle Jamieson   Aerial Channel Prediction and User
                                  Scheduling in Mobile Drone Hotspots  . . 2679--2692
                    Mao Zou and   
           Richard T. B. Ma and   
                   Xin Wang and   
                     Yinlong Xu   On Optimal Service Differentiation in
                                  Congested Network Markets  . . . . . . . 2693--2706
                 Xuanyu Cao and   
              Junshan Zhang and   
                H. Vincent Poor   Data Center Demand Response With On-Site
                                  Renewable Generation: a Bargaining
                                  Approach . . . . . . . . . . . . . . . . 2707--2720
            Jean-Yves Le Boudec   A Theory of Traffic Regulators for
                                  Deterministic Networks With Application
                                  to Interleaved Regulators  . . . . . . . 2721--2733
              Cheol-Ho Hong and   
              Kyungwoon Lee and   
              Jaehyun Hwang and   
              Hyunchan Park and   
                      Chuck Yoo   Kafe: Can OS Kernels Forward Packets
                                  Fast Enough for Software Routers?  . . . 2734--2747
                    Yibo Pi and   
                Sugih Jamin and   
               Peter Danzig and   
                    Jacob Shaha   AP-Atoms: a High-Accuracy Data-Driven
                                  Client Aggregation for Global Load
                                  Balancing  . . . . . . . . . . . . . . . 2748--2761
                Lichao Yang and   
                 Heli Zhang and   
                      Xi Li and   
                    Hong Ji and   
             Victor C. M. Leung   A Distributed Computation Offloading
                                  Strategy in Small-Cell Networks
                                  Integrated With Mobile Edge Computing    2762--2773
                   Xiwen Yu and   
                  Hongli Xu and   
                     Da Yao and   
                 Haibo Wang and   
                 Liusheng Huang   CountMax: a Lightweight and Cooperative
                                  Sketch Measurement for Software-Defined
                                  Networks . . . . . . . . . . . . . . . . 2774--2786
      Mohamed Lamine Lamali and   
         Nasreddine Fergani and   
                  Johanne Cohen   Algorithmic and Complexity Aspects of
                                  Path Computation in Multi-Layer Networks 2787--2800
          Francesca Fossati and   
               Sahar Hoteit and   
            Stefano Moretti and   
                  Stefano Secci   Fair Resource Allocation in Systems With
                                  Complete Information Sharing . . . . . . 2801--2814
            Salvatore D'Oro and   
        Francesco Restuccia and   
            Tommaso Melodia and   
                 Sergio Palazzo   Low-Complexity Distributed Radio Access
                                  Network Slicing: Algorithms and
                                  Experimental Results . . . . . . . . . . 2815--2828
             Anna Engelmann and   
             Wolfgang Bziuk and   
               Admela Jukan and   
                  Muriel Medard   Exploiting Parallelism With Random
                                  Linear Network Coding in High-Speed
                                  Ethernet Systems . . . . . . . . . . . . 2829--2842
                    An Wang and   
               Wentao Chang and   
              Songqing Chen and   
                  Aziz Mohaisen   Delving Into Internet DDoS Attacks by
                                  Botnets: Characterization and Analysis   2843--2855
                  Ping Zhao and   
               Hongbo Jiang and   
             John C. S. Lui and   
                  Chen Wang and   
                 Fanzi Zeng and   
                    Fu Xiao and   
                      Zhetao Li   P3-LOC: a Privacy-Preserving
                                  Paradigm-Driven Framework for Indoor
                                  Localization . . . . . . . . . . . . . . 2856--2869
                  Xudong Wu and   
                   Luoyi Fu and   
                 Yuhang Yao and   
                  Xinzhe Fu and   
               Xinbing Wang and   
                    Guihai Chen   GLP: a Novel Framework for Group-Level
                                  Location Promotion in Geo-Social
                                  Networks . . . . . . . . . . . . . . . . 2870--2883


IEEE\slash ACM Transactions on Networking
Volume 27, Number 1, February, 2019

                   Wei Dong and   
               Chenhong Cao and   
               Xiaoyu Zhang and   
                         Yi Gao   Understanding Path Reconstruction
                                  Algorithms in Multihop Wireless Networks 1--14
      Alireza Shams Shafigh and   
                Savo Glisic and   
              Ekram Hossain and   
            Beatriz Lorenzo and   
                Luiz A. DaSilva   User-Centric Distributed Spectrum
                                  Sharing in Dynamic Network Architectures 15--28
    Siddhartha S. Borkotoky and   
             Michael B. Pursley   Fountain-Coded Broadcast Distribution in
                                  Multiple-Hop Packet Radio Networks . . . 29--41
                  Jihong Yu and   
                   Wei Gong and   
             Jiangchuan Liu and   
                   Lin Chen and   
                     Kehao Wang   On Efficient Tree-Based Tag Search in
                                  Large-Scale RFID Systems . . . . . . . . 42--55
           Alain Pegatoquet and   
              Trong Nhan Le and   
                  Michele Magno   A Wake-Up Radio-Based MAC Protocol for
                                  Autonomous Wireless Sensor Networks  . . 56--70
          Wahhab Albazrqaoe and   
                  Jun Huang and   
                  Guoliang Xing   A Practical Bluetooth Traffic Sniffing
                                  System: Design, Implementation, and
                                  Countermeasure . . . . . . . . . . . . . 71--84
             Sladana Josilo and   
                     Gyorgy Dan   Decentralized Algorithm for Randomized
                                  Task Allocation in Fog Computing Systems 85--97
               Guoming Tang and   
                  Huan Wang and   
                     Kui Wu and   
                       Deke Guo   Tapping the Knowledge of Dynamic Traffic
                                  Demands for Optimal CDN Design . . . . . 98--111
               John Tadrous and   
            Atilla Eryilmaz and   
             Ashutosh Sabharwal   Action-Based Scheduling: Leveraging App
                                  Interactivity for Scheduler Efficiency   112--125
                  Jiaqi Liu and   
                   Luoyi Fu and   
                 Yuhang Yao and   
                  Xinzhe Fu and   
               Xinbing Wang and   
                    Guihai Chen   Modeling, Analysis and Validation of
                                  Evolving Networks With Hybrid
                                  Interactions . . . . . . . . . . . . . . 126--142
               Qingjun Xiao and   
               Shigang Chen and   
                    Jia Liu and   
                Guang Cheng and   
                    Junzhou Luo   A Protocol for Simultaneously Estimating
                                  Moments and Popular Groups in a
                                  Multigroup RFID System . . . . . . . . . 143--158
                    Jia Liu and   
               Shigang Chen and   
               Qingjun Xiao and   
                   Min Chen and   
                   Bin Xiao and   
                     Lijun Chen   Efficient Information Sampling in
                                  Multi-Category RFID Systems  . . . . . . 159--172
                 Peng Zhang and   
                Cheng Zhang and   
                   Chengchen Hu   Fast Data Plane Testing for
                                  Software-Defined Networks With
                                  RuleChecker  . . . . . . . . . . . . . . 173--186
                Wenping Liu and   
               Hongbo Jiang and   
               Guoyin Jiang and   
             Jiangchuan Liu and   
               Xiaoqiang Ma and   
                   Yufu Jia and   
                        Fu Xiao   Indoor Navigation With Virtual Graph
                                  Representation: Exploiting Peak
                                  Intensities of Unmodulated Luminaries    187--200
               Xiaofeng Gao and   
               Yuanning Gao and   
                 Yichen Zhu and   
                    Guihai Chen   U2-Tree: a Universal Two-Layer
                                  Distributed Indexing Scheme for Cloud
                                  Storage System . . . . . . . . . . . . . 201--213
                   Yong Cui and   
                Yimin Jiang and   
                   Zeqi Lai and   
              Xiaomeng Chen and   
              Y. Charlie Hu and   
                    Kun Tan and   
               Minglong Dai and   
                  Kai Zheng and   
                          Yi Li   Wireless Network Instabilities in the
                                  Wild: Measurement, Applications
                                  NonResilience, and OS Remedy . . . . . . 214--230
                   Xu Zhang and   
             Edward W. Knightly   CSIsnoop: Inferring Channel State
                                  Information in Multi-User MIMO WLANs . . 231--244
              Linsong Cheng and   
                   Jiliang Wang   Walls Have No Ears: a Non-Intrusive
                                  WiFi-Based User Identification System
                                  for Mobile Devices . . . . . . . . . . . 245--257
             Yigal Bejerano and   
       Chandrashekhar Raman and   
                Chun-Nam Yu and   
                Varun Gupta and   
            Craig Gutterman and   
                Tomas Young and   
            Hugo A. Infante and   
       Yousef M. Abdelmalek and   
                    Gil Zussman   DyMo: Dynamic Monitoring of Large-Scale
                                  LTE-Multicast Systems  . . . . . . . . . 258--271
                Jianer Zhou and   
                  Zhenyu Li and   
                 Qinghua Wu and   
           Peter Steenkiste and   
                Steve Uhlig and   
                     Jun Li and   
                    Gaogang Xie   TCP Stalls at the Server Side:
                                  Measurement and Mitigation . . . . . . . 272--287
    Konstantinos Poularakis and   
           George Iosifidis and   
       Georgios Smaragdakis and   
             Leandros Tassiulas   Optimizing Gradual SDN Upgrades in ISP
                                  Networks . . . . . . . . . . . . . . . . 288--301
                 Per Hurtig and   
        Karl-Johan Grinnemo and   
             Anna Brunstrom and   
              Simone Ferlin and   
                  Ozgu Alay and   
                   Nicolas Kuhn   Low-Latency Scheduling in MPTCP  . . . . 302--315
                Ali Maatouk and   
             Mohamad Assaad and   
             Anthony Ephremides   Energy Efficient and Throughput Optimal
                                  CSMA Scheme  . . . . . . . . . . . . . . 316--329
                   Meng Jin and   
                    Yuan He and   
                   Xin Meng and   
                Yilun Zheng and   
                Dingyi Fang and   
                 Xiaojiang Chen   FlipTracer: Practical Parallel Decoding
                                  for Backscatter Communication  . . . . . 330--343
                Zhenhua Han and   
               Haisheng Tan and   
                   Rui Wang and   
                Guihai Chen and   
                  Yupeng Li and   
           Francis Chi Moon Lau   Energy-Efficient Dynamic Virtual Machine
                                  Management in Data Centers . . . . . . . 344--360
               Chengwen Luo and   
                   Xiao Liu and   
                  Wanli Xue and   
                 Yiran Shen and   
               Jianqiang Li and   
                     Wen Hu and   
                    Alex X. Liu   Predictable Privacy-Preserving Mobile
                                  Crowd Sensing: a Tale of Two Roles . . . 361--374
                  Yahui Sun and   
              Marcus Brazil and   
              Doreen Thomas and   
                Saman Halgamuge   The Fast Heuristic Algorithms and
                                  Post-Processing Techniques to Design
                                  Large and Low-Cost Communication
                                  Networks . . . . . . . . . . . . . . . . 375--388
                    Sen Liu and   
               Jiawei Huang and   
                 Yutao Zhou and   
               Jianxin Wang and   
                        Tian He   Task-Aware TCP in Data Center Networks   389--404
            Taha Bouchoucha and   
             Chen-Nee Chuah and   
                       Zhi Ding   Topology Inference of Unknown Networks
                                  Based on Robust Virtual Coordinate
                                  Systems  . . . . . . . . . . . . . . . . 405--418
                David Lynch and   
             Michael Fenton and   
                David Fagan and   
              Stepan Kucera and   
            Holger Claussen and   
                Michael O'Neill   Automated Self-Optimization in
                                  Heterogeneous Wireless Communications
                                  Networks . . . . . . . . . . . . . . . . 419--432
             Satyam Agarwal and   
       Francesco Malandrino and   
  Carla Fabiana Chiasserini and   
                      Swades De   VNF Placement and Resource Allocation
                                  for the Support of Vertical Services in
                                  $5$G Networks  . . . . . . . . . . . . . 433--446
                      Li Lu and   
                   Jiadi Yu and   
              Yingying Chen and   
                 Hongbo Liu and   
                 Yanmin Zhu and   
                Linghe Kong and   
                      Minglu Li   Lip Reading-Based User Authentication
                                  Through Acoustic Sensing on Smartphones  447--460

IEEE\slash ACM Transactions on Networking
Volume 27, Number 2, April, 2019

    Oladele Theophilus Sule and   
        Roberto Rojas-Cessa and   
                Ziqian Dong and   
                   Chuan-Bi Lin   A Split-Central-Buffered Load-Balancing
                                  Clos-Network Switch With In-Order
                                  Forwarding . . . . . . . . . . . . . . . 467--476
            Mostafa Dehghan and   
                  Weibo Chu and   
              Philippe Nain and   
                Don Towsley and   
                   Zhi-Li Zhang   Sharing Cache Resources Among Content
                                  Providers: a Utility-Based Approach  . . 477--490
            Chang-Heng Wang and   
               Jaime Llorca and   
          Antonia M. Tulino and   
                    Tara Javidi   Dynamic Cloud Network Control Under
                                  Reconfiguration Delay and Cost . . . . . 491--504
               Vijay S. Rao and   
       R. Venkatesha Prasad and   
            T. V. Prabhakar and   
              Chayan Sarkar and   
          Madhusudan Koppal and   
               Ignas Niemegeers   Understanding and Improving the
                                  Performance of Constructive Interference
                                  Using Destructive Interference in WSNs   505--517
                Xianjin Xia and   
                 Shining Li and   
                   Yu Zhang and   
                  Bingqi Li and   
             Yuanqing Zheng and   
                         Tao Gu   Enabling Out-of-Band Coordination of
                                  Wi-Fi Communications on Smartphones  . . 518--531
               Irem Koprulu and   
                  Yoora Kim and   
                 Ness B. Shroff   Battle of Opinions Over Evolving Social
                                  Networks . . . . . . . . . . . . . . . . 532--545
                 Liang Song and   
                Chunyan Liu and   
               Hejiao Huang and   
                 Hongwei Du and   
                    Xiaohua Jia   Minimum Connected Dominating Set Under
                                  Routing Cost Constraint in Wireless
                                  Sensor Networks With Different
                                  Transmission Ranges  . . . . . . . . . . 546--559
     Ahmed Osama Fathy Atya and   
                Zhiyun Qian and   
  Srikanth V. Krishnamurthy and   
            Thomas La Porta and   
           Patrick McDaniel and   
                 Lisa M. Marvel   Catch Me if You Can: a Closer Look at
                                  Malicious Co-Residency on the Cloud  . . 560--576
             Vaibhav Bajpai and   
             Jurgen Schonwalder   A Longitudinal View of Dual-Stacked
                                  Websites --- Failures, Latency and Happy
                                  Eyeballs . . . . . . . . . . . . . . . . 577--590
             Balint Tillman and   
         Athina Markopoulou and   
                Minas Gjoka and   
               Carter T. Buttsc   2K+ Graph Construction Framework:
                                  Targeting Joint Degree Matrix and Beyond 591--606
            S. Ramakrishnan and   
             Venkatesh Ramaiyan   Completely Uncoupled Algorithms for
                                  Network Utility Maximization . . . . . . 607--620
                     Xin Li and   
                Minmei Wang and   
                Huazhe Wang and   
                      Ye Yu and   
                      Chen Qian   Toward Secure and Efficient
                                  Communication for the Internet of Things 621--634
              Roman Naumann and   
             Stefan Dietzel and   
              Bjorn Scheuermann   Push the Barrier: Discrete Event
                                  Protocol Emulation . . . . . . . . . . . 635--648
                   Xiang Li and   
             J. David Smith and   
              Thang N. Dinh and   
                     My T. Thai   TipTop: Almost Exact Solutions for
                                  Influence Maximization in Billion-Scale
                                  Networks . . . . . . . . . . . . . . . . 649--661
            Pablo Caballero and   
              Albert Banchs and   
         Gustavo De Veciana and   
             Xavier Costa-Perez   Network Slicing Games: Enabling
                                  Customization in Multi-Tenant Mobile
                                  Networks . . . . . . . . . . . . . . . . 662--675
              Ming-Chun Lee and   
         Andreas F. Molisch and   
            Nishanth Sastry and   
                 Aravindh Raman   Individual Preference Probability
                                  Modeling and Parameterization for Video
                                  Content in Wireless Caching Networks . . 676--690
                Yehuda Afek and   
          Anat Bremler-Barr and   
            Shir Landau Feibish   Zero-Day Signature Extraction for
                                  High-Volume Attacks  . . . . . . . . . . 691--706
             Cataldo Basile and   
             Fulvio Valenza and   
               Antonio Lioy and   
             Diego R. Lopez and   
         Antonio Pastor Perales   Adding Support for Automatic Enforcement
                                  of Security Policies in NFV Networks . . 707--720
                    Hui Cui and   
             Robert H. Deng and   
                    Guilin Wang   An Attribute-Based Framework for Secure
                                  Communications in Vehicular Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 721--733
     Bijoy Chand Chatterjee and   
                   Fujun He and   
                   Eiji Oki and   
           Andrea Fumagalli and   
                Naoaki Yamanaka   A Span Power Management Scheme for Rapid
                                  Lightpath Provisioning and Releasing in
                                  Multi-Core Fiber Networks  . . . . . . . 734--747
               Qingjun Xiao and   
               Youlin Zhang and   
               Shigang Chen and   
                   Min Chen and   
                    Jia Liu and   
                Guang Cheng and   
                    Junzhou Luo   Estimating Cardinality of Arbitrary
                                  Expression of Multiple Tag Sets in a
                                  Distributed RFID System  . . . . . . . . 748--762
               Peshal Nayak and   
            Michele Garetto and   
             Edward W. Knightly   Modeling Multi-User WLANs Under
                                  Closed-Loop Traffic  . . . . . . . . . . 763--776
           Chavoosh Ghasemi and   
              Hamed Yousefi and   
               Kang G. Shin and   
                 Beichuan Zhang   On the Granularity of Trie-Based Data
                                  Structures for Name Lookups and Updates  777--789
             Shih-Hao Tseng and   
                    Ao Tang and   
         Gagan L. Choudhury and   
                      Simon Tse   Routing Stability in Hybrid
                                  Software-Defined Networks  . . . . . . . 790--804
                    Kai Gao and   
                 Qiao Xiang and   
                   Xin Wang and   
          Yang Richard Yang and   
                         Jun Bi   An Objective-Driven On-Demand Network
                                  Abstraction for Adaptive Applications    805--818
             Qiongzheng Lin and   
                   Lei Yang and   
               Chunhui Duan and   
                     Zhenlin An   Tash: Toward Selective Reading as Hash
                                  Primitives for Gen2 RFIDs  . . . . . . . 819--834
       Abubakr O. Al-Abbasi and   
            Vaneet Aggarwal and   
                   Moo-Ryong Ra   Multi-Tier Caching Analysis in CDN-Based
                                  Over-the-Top Video Streaming Systems . . 835--847
                  Qian Wang and   
                 Jing Huang and   
               Yanjiao Chen and   
                   Xin Tian and   
                     Qian Zhang   Privacy-Preserving and Truthful Double
                                  Auction for Heterogeneous Spectrum . . . 848--861
               Kunal Phalak and   
               D. Manjunath and   
              Jayakrishnan Nair   Zero Rating: The Power in the Middle . . 862--874
                Josu Doncel and   
               Samuli Aalto and   
                   Urtzi Ayesta   Performance Degradation in
                                  Parallel-Server Systems  . . . . . . . . 875--888
                 Shuihai Hu and   
                   Yibo Zhu and   
                 Peng Cheng and   
             Chuanxiong Guo and   
                    Kun Tan and   
            Jitendra Padhye and   
                       Kai Chen   Tagger: Practical PFC Deadlock
                                  Prevention in Data Center Networks . . . 889--902

IEEE\slash ACM Transactions on Networking
Volume 27, Number 3, June, 2019

               Michael J. Neely   Convergence and Adaptation for Utility
                                  Optimal Opportunistic Scheduling . . . . 904--917
            Giovanni Chisci and   
              Hesham Elsawy and   
               Andrea Conti and   
       Mohamed-Slim Alouini and   
                     Moe Z. Win   Uncoordinated Massive Wireless Networks:
                                  Spatiotemporal Models and Multiaccess
                                  Strategies . . . . . . . . . . . . . . . 918--931
                Zicheng Chi and   
                     Yan Li and   
                 Hongyu Sun and   
                        Yao and   
                       Ting Zhu   Concurrent Cross-Technology
                                  Communication Among Heterogeneous IoT
                                  Devices  . . . . . . . . . . . . . . . . 932--947
                    Jia Liu and   
                   Bin Xiao and   
                   Xuan Liu and   
                     Kai Bu and   
                 Lijun Chen and   
                   Changhai Nie   Efficient Polling-Based Information
                                  Collection in RFID Systems . . . . . . . 948--961
                Abbas Kiani and   
              Nirwan Ansari and   
             Abdallah Khreishah   Hierarchical Capacity Provisioning for
                                  Fog Computing  . . . . . . . . . . . . . 962--971
                   Jiaxi Gu and   
               Jiliang Wang and   
                  Zhiwen Yu and   
                      Kele Shen   Traffic-Based Side-Channel Attack in
                                  Video Streaming  . . . . . . . . . . . . 972--985
                 Meng Zhang and   
                    Lin Gao and   
              Jianwei Huang and   
               Michael L. Honig   Hybrid Pricing for Mobile Collaborative
                                  Internet Access  . . . . . . . . . . . . 986--999
        Marco Di Bartolomeo and   
        Valentino Di Donato and   
          Maurizio Pizzonia and   
         Claudio Squarcella and   
              Massimo Rimondini   Extracting Routing Events From
                                  Traceroutes: a Matter of Empathy . . . . 1000--1012
            Mostafa Dehghan and   
          Laurent Massoulie and   
                Don Towsley and   
      Daniel Sadoc Menasche and   
                      Y. C. Tay   A Utility Optimization Approach to
                                  Network Cache Design . . . . . . . . . . 1013--1027
                    Tie Qiu and   
                    Jie Liu and   
                Weisheng Si and   
               Dapeng Oliver Wu   Robustness Optimization Scheme With
                                  Multi-Population Co-Evolution for
                                  Scale-Free Wireless Sensor Networks  . . 1028--1042
                Semih Cayci and   
                Atilla Eryilmaz   Optimal Learning for Dynamic Coding in
                                  Deadline-Constrained Multi-Channel
                                  Networks . . . . . . . . . . . . . . . . 1043--1054
                Linghe Kong and   
                 Yifeng Cao and   
                   Liang He and   
                Guihai Chen and   
                 Min-You Wu and   
                        Tian He   Multi-Rate Selection in ZigBee . . . . . 1055--1068
              Wenchao Jiang and   
                Zhimeng Yin and   
                Ruofeng Liu and   
                  Zhijun Li and   
               Song Min Kim and   
                        Tian He   Boosting the Bitrate of Cross-Technology
                                  Communication on Commodity IoT Devices   1069--1083
             Hirotada Honda and   
                  Hiroshi Saito   Nation-Wide Disaster Avoidance Control
                                  Against Heavy Rain . . . . . . . . . . . 1084--1097
               Zongzong Lin and   
                 Wenlian Lu and   
                    Shouhuai Xu   Unified Preventive and Reactive Cyber
                                  Defense Dynamics Is Still Globally
                                  Convergent . . . . . . . . . . . . . . . 1098--1111
               Kung-Jui Pai and   
                 Jou-Ming Chang   Dual-CISTs: Configuring a Protection
                                  Routing on Some Cayley Networks  . . . . 1112--1123
                 Zonghui Li and   
                    Hai Wan and   
                 Zaiyu Pang and   
                 Qiubo Chen and   
              Yangdong Deng and   
                 Xibin Zhao and   
                    Yue Gao and   
                Xiaoyu Song and   
                        Ming Gu   An Enhanced Reconfiguration for
                                  Deterministic Transmission in
                                  Time-Triggered Networks  . . . . . . . . 1124--1137
               Anis Elgabli and   
           Muhamad Felemban and   
                Vaneet Aggarwal   GroupCast: Preference-Aware Cooperative
                                  Video Streaming With Scalable Video
                                  Coding . . . . . . . . . . . . . . . . . 1138--1150
          Duong Tung Nguyen and   
                Long Bao Le and   
              Vijay K. Bhargava   A Market-Based Framework for
                                  Multi-Resource Allocation in Fog
                                  Computing  . . . . . . . . . . . . . . . 1151--1164
        Federico Chiariotti and   
              Stepan Kucera and   
             Andrea Zanella and   
                Holger Claussen   Analysis and Design of a Latency Control
                                  Protocol for Multi-Path Data Delivery
                                  With Pre-Defined QoS Guarantees  . . . . 1165--1178
                Xiulong Liu and   
               Jiannong Cao and   
                 Yanni Yang and   
                   Wenyu Qu and   
                 Xibin Zhao and   
                   Keqiu Li and   
                       Didi Yao   Fast RFID Sensory Data Collection:
                                  Trade-off Between Computation and
                                  Communication Costs  . . . . . . . . . . 1179--1191
            Thi-Minh Nguyen and   
               Andre Girard and   
        Catherine Rosenberg and   
                    Serge Fdida   Routing via Functions in Virtual
                                  Networks: The Curse of Choices . . . . . 1192--1205
                Jaehyun Nam and   
              Hyeonseong Jo and   
               Yeonkeun Kim and   
             Phillip Porras and   
          Vinod Yegneswaran and   
                  Seungwon Shin   Operator-Defined Reconfigurable Network
                                  OS for Software-Defined Networks . . . . 1206--1219
                Kaiping Xue and   
                 Peixuan He and   
                Xiang Zhang and   
                Qiudong Xia and   
            David S. L. Wei and   
                    Hao Yue and   
                        Feng Wu   A Secure, Efficient, and Accountable
                                  Edge-Based Access Control Framework for
                                  Information Centric Networks . . . . . . 1220--1233
                 Junjie Xie and   
                   Deke Guo and   
                  Chen Qian and   
                    Lei Liu and   
               Bangbang Ren and   
                   Honghui Chen   Validation of Distributed SDN Control
                                  Plane Under Uncertain Failures . . . . . 1234--1247
            Ahmed M. Bedewy and   
                    Yin Sun and   
                 Ness B. Shroff   The Age of Information in Multihop
                                  Networks . . . . . . . . . . . . . . . . 1248--1257
                   Han Deng and   
                   Tao Zhao and   
                     I-Hong Hou   Online Routing and Scheduling With
                                  Capacity Redundancy for Timely Delivery
                                  Guarantees in Multihop Networks  . . . . 1258--1271
              Shiqiang Wang and   
            Rahul Urgaonkar and   
              Murtaza Zafer and   
                    Ting He and   
                 Kevin Chan and   
                   Kin K. Leung   Dynamic Service Migration in Mobile Edge
                                  Computing Based on Markov Decision
                                  Process  . . . . . . . . . . . . . . . . 1272--1288
        G. Enrico Santagati and   
                Tommaso Melodia   Corrections to ``A Software-Defined
                                  Ultrasonic Networking Framework for
                                  Wearable Devices'' . . . . . . . . . . . 1289--1289

IEEE\slash ACM Transactions on Networking
Volume 27, Number 4, August, 2019

            Giovanni Chisci and   
               Andrea Conti and   
             Lorenzo Mucchi and   
                     Moe Z. Win   Intrinsic Secrecy in Inhomogeneous
                                  Stochastic Networks  . . . . . . . . . . 1291--1304
           Anvitha Nandigam and   
                  Suraj Jog and   
               D. Manjunath and   
          Jayakrishnan Nair and   
          Balakrishna J. Prabhu   Sharing Within Limits: Partial Resource
                                  Pooling in Loss Systems  . . . . . . . . 1305--1318
              Tianheng Wang and   
               Andrea Conti and   
                     Moe Z. Win   Network Navigation With Scheduling:
                                  Distributed Algorithms . . . . . . . . . 1319--1329
           Chien-Sheng Yang and   
           Ramtin Pedarsani and   
           A. Salman Avestimehr   Communication-Aware Scheduling of Serial
                                  Tasks for Dispersed Computing  . . . . . 1330--1343
          George Trimponias and   
                   Yan Xiao and   
                 Xiaorui Wu and   
                    Hong Xu and   
                    Yanhui Geng   Node-Constrained Traffic Engineering:
                                  Theory and Applications  . . . . . . . . 1344--1358
                Igor Kadota and   
             Abhishek Sinha and   
                  Eytan Modiano   Scheduling Algorithms for Optimizing Age
                                  of Information in Wireless Networks With
                                  Throughput Constraints . . . . . . . . . 1359--1372
              Shengchao Liu and   
              Jianping Weng and   
            Jessie Hui Wang and   
               Changqing An and   
                Yipeng Zhou and   
                    Jilong Wang   An Adaptive Online Scheme for Scheduling
                                  and Resource Enforcement in Storm  . . . 1373--1386
         Bruno Y. L. Kimura and   
    Demetrius C. S. F. Lima and   
          Leandro A. Villas and   
         Antonio A. F. Loureiro   Interpath Contention in MultiPath TCP
                                  Disjoint Paths . . . . . . . . . . . . . 1387--1400
          Vishal Shrivastav and   
                 Ki Suh Lee and   
                   Han Wang and   
             Hakim Weatherspoon   Globally Synchronized Time via
                                  Datacenter Networks  . . . . . . . . . . 1401--1416
                 James Daly and   
            Valerio Bruschi and   
      Leonardo Linguaglossa and   
       Salvatore Pontarelli and   
                Dario Rossi and   
              Jerome Tollet and   
                 Eric Torng and   
             Andrew Yourtchenko   TupleMerge: Fast Software Packet
                                  Processing for Online Packet
                                  Classification . . . . . . . . . . . . . 1417--1431
              Ran Ben Basat and   
                Xiaoqi Chen and   
               Gil Einziger and   
               Roy Friedman and   
                  Yaron Kassner   Randomized Admission Policy for
                                  Efficient Top-$k$, Frequency, and Volume
                                  Estimation . . . . . . . . . . . . . . . 1432--1445
              Yahia Shabara and   
             C. Emre Koksal and   
                    Eylem Ekici   Beam Discovery Using Linear Block Codes
                                  for Millimeter Wave Communication
                                  Networks . . . . . . . . . . . . . . . . 1446--1459
              Zhizhen Zhong and   
                    Nan Hua and   
          Massimo Tornatore and   
                 Jialong Li and   
                   Yanhe Li and   
             Xiaoping Zheng and   
            Biswanath Mukherjee   Provisioning Short-Term Traffic
                                  Fluctuations in Elastic Optical Networks 1460--1473
        Miroslaw Klinkowski and   
            Krzysztof Walkowiak   An Efficient Optimization Framework for
                                  Solving RSSA Problems in Spectrally and
                                  Spatially Flexible Optical Networks  . . 1474--1486
                  Jie Chuai and   
                Victor O. K. Li   An Analytical Framework for Resource
                                  Allocation Between Data and Delayed
                                  Network State Information  . . . . . . . 1487--1500
                     Hao Yu and   
               Michael J. Neely   Learning-Aided Optimization for
                                  Energy-Harvesting Devices With Outdated
                                  State Information  . . . . . . . . . . . 1501--1514
              Xiaonan Zhang and   
                  Pei Huang and   
                  Linke Guo and   
                   Yuguang Fang   Social-Aware Energy-Efficient Data
                                  Offloading With Strong Stability . . . . 1515--1528
         Thibaut Stimpfling and   
           Normand Belanger and   
      J. M. Pierre Langlois and   
                   Yvon Savaria   SHIP: a Scalable High-Performance IPv6
                                  Lookup Algorithm That Exploits Prefix
                                  Characteristics  . . . . . . . . . . . . 1529--1542
     Vincenzo Sciancalepore and   
         Xavier Costa-Perez and   
                  Albert Banchs   RL-NSB: Reinforcement Learning-Based
                                  $5$G Network Slice Broker  . . . . . . . 1543--1557
                 Yuedong Xu and   
                Zhujun Xiao and   
                  Tianyu Ni and   
            Jessie Hui Wang and   
                   Xin Wang and   
                   Eitan Altman   On The Robustness of Price-Anticipating
                                  Kelly Mechanism  . . . . . . . . . . . . 1558--1571
               Arjun Bakshi and   
                    Lu Chen and   
          Kannan Srinivasan and   
             C. Emre Koksal and   
                Atilla Eryilmaz   EMIT: an Efficient MAC Paradigm for the
                                  Internet of Things . . . . . . . . . . . 1572--1583
          Cheng-Shang Chang and   
              Duan-Shin Lee and   
                      Chun Wang   Asynchronous Grant-Free Uplink
                                  Transmissions in Multichannel Wireless
                                  Networks With Heterogeneous QoS
                                  Guarantees . . . . . . . . . . . . . . . 1584--1597
                Yongquan Fu and   
               Dongsheng Li and   
            Pere Barlet-Ros and   
                 Chun Huang and   
                 Zhen Huang and   
                  Siqi Shen and   
                      Huayou Su   A Skewness-Aware Matrix Factorization
                                  Approach for Mesh-Structured Cloud
                                  Services . . . . . . . . . . . . . . . . 1598--1611
                   Yong Cui and   
                Ningwei Dai and   
                   Zeqi Lai and   
                 Minming Li and   
                 Zhenhua Li and   
                  Yuming Hu and   
                    Kui Ren and   
                     Yuchi Chen   TailCutter: Wisely Cutting Tail Latency
                                  in Cloud CDNs Under Cost Constraints . . 1612--1628
             Ahmed Boubrima and   
              Walid Bechkit and   
                   Herve Rivano   On the Deployment of Wireless Sensor
                                  Networks for Air Quality Mapping:
                                  Optimization Models and Algorithms . . . 1629--1642
                Ziyao Zhang and   
                   Liang Ma and   
               Kin K. Leung and   
                  Franck Le and   
            Sastry Kompella and   
             Leandros Tassiulas   How Advantageous Is It? An Analytical
                                  Study of Controller-Assisted Path
                                  Construction in Distributed SDN  . . . . 1643--1656
         Arpan Mukhopadhyay and   
                Nidhi Hegde and   
                   Marc Lelarge   Asymptotics of Replication and Matching
                                  in Large Caching Systems . . . . . . . . 1657--1668
                Junyang Shi and   
                     Mo Sha and   
                  Zhicheng Yang   Distributed Graph Routing and Scheduling
                                  for Industrial Wireless Sensor-Actuator
                                  Networks . . . . . . . . . . . . . . . . 1669--1682
       Nikolaos Liakopoulos and   
        Georgios S. Paschos and   
       Thrasyvoulos Spyropoulos   Robust Optimization Framework for
                                  Proactive User Association in UDNs: a
                                  Data-Driven Approach . . . . . . . . . . 1683--1695
           Christos Liaskos and   
       Ageliki Tsioliaridou and   
                  Shuai Nie and   
        Andreas Pitsillides and   
          Sotiris Ioannidis and   
                Ian F. Akyildiz   On the Network-Layer Modeling and
                                  Configuration of Programmable Wireless
                                  Environments . . . . . . . . . . . . . . 1696--1713
                    Yu Zhou and   
                     Jun Bi and   
                Cheng Zhang and   
               Bingyang Liu and   
                Zhaogeng Li and   
              Yangyang Wang and   
                      Mingli Yu   P4DB: On-the-Fly Debugging for
                                  Programmable Data Planes . . . . . . . . 1714--1727
        Siddhartha Satpathi and   
               Supratim Deb and   
                 R. Srikant and   
                         He Yan   Learning Latent Events From Network
                                  Message Logs . . . . . . . . . . . . . . 1728--1741
                   Fujun He and   
              Takehiro Sato and   
                       Eiji Oki   Optimization Model for Backup Resource
                                  Allocation in Middleboxes With
                                  Importance . . . . . . . . . . . . . . . 1742--1755
       Francesco Malandrino and   
  Carla Fabiana Chiasserini and   
            Claudio Casetti and   
                Giada Landi and   
                 Marco Capitani   An Optimization-Enhanced MANO for
                                  Energy-Efficient $5$G Networks . . . . . 1756--1769

IEEE\slash ACM Transactions on Networking
Volume 27, Number 5, October, 2019

               Haisheng Tan and   
       Shaofeng H.-C. Jiang and   
                  Yupeng Li and   
              Xiang-Yang Li and   
               Chenzi Zhang and   
                Zhenhua Han and   
           Francis Chi Moon Lau   Joint Online Coflow Routing and
                                  Scheduling in Data Center Networks . . . 1771--1786
                Cesar Ghali and   
                Gene Tsudik and   
                     Ersin Uzun   In Content We Trust: Network-Layer Trust
                                  in Content-Centric Networking  . . . . . 1787--1800
                 Huikang Li and   
                     Yi Gao and   
                   Wei Dong and   
                      Chun Chen   Preferential Link Tomography in Dynamic
                                  Networks . . . . . . . . . . . . . . . . 1801--1814
                   Pan Zhou and   
                     Jie Xu and   
                   Wei Wang and   
                 Yuchong Hu and   
           Dapeng Oliver Wu and   
                    Shouling Ji   Toward Optimal Adaptive Online Shortest
                                  Path Routing With Acceleration Under
                                  Jamming Attack . . . . . . . . . . . . . 1815--1829
           Majid Khabbazian and   
         Keyvan Gharouni Saffar   The Gain of Energy Accumulation in
                                  Multi-Hop Wireless Network Broadcast . . 1830--1844
                  Tong Yang and   
               Haowei Zhang and   
                 Jinyang Li and   
                Junzhi Gong and   
                Steve Uhlig and   
               Shigang Chen and   
                    Xiaoming Li   HeavyKeeper: an Accurate Algorithm for
                                  Finding Top-$k$ Elephant Flows . . . . . 1845--1858
                Jiaqi Zheng and   
                    Hong Xu and   
                Xiaojun Zhu and   
                Guihai Chen and   
                    Yanhui Geng   Sentinel: Failure Recovery in
                                  Centralized Traffic Engineering  . . . . 1859--1872
                Xiulong Liu and   
                    Xin Xie and   
            Shangguang Wang and   
                    Jia Liu and   
                   Didi Yao and   
               Jiannong Cao and   
                       Keqiu Li   Efficient Range Queries for Large-Scale
                                  Sensor-Augmented RFID Systems  . . . . . 1873--1886
                    Qing He and   
                 Gyorgy Dan and   
                 Viktoria Fodor   Joint Assignment and Scheduling for
                                  Minimizing Age of Correlated Information 1887--1900
              Dalia Popescu and   
           Philippe Jacquet and   
               Bernard Mans and   
             Robert Dumitru and   
              Andra Pastrav and   
               Emanuel Puschita   Information Dissemination Speed in Delay
                                  Tolerant Urban Vehicular Networks in a
                                  Hyperfractal Setting . . . . . . . . . . 1901--1914
      H. V. Kalpanie Mendis and   
  Indika A. M. Balapuwaduge and   
                    Frank Y. Li   Dependability-Based Reliability Analysis
                                  in URC Networks: Availability in the
                                  Space Domain . . . . . . . . . . . . . . 1915--1930
                 Ruozhou Yu and   
               Guoliang Xue and   
                    Xiang Zhang   Provisioning QoS-Aware and Robust
                                  Applications in Internet of Things: a
                                  Network Perspective  . . . . . . . . . . 1931--1944
              Xiang-Yang Li and   
                  Huiqi Liu and   
                  Lan Zhang and   
                  Zhenan Wu and   
                Yaochen Xie and   
                    Ge Chen and   
               Chunxiao Wan and   
                 Zhongwei Liang   Finding the Stars in the Fireworks: Deep
                                  Understanding of Motion Sensor
                                  Fingerprint  . . . . . . . . . . . . . . 1945--1958
               Xiaowen Gong and   
                 Ness B. Shroff   Truthful Mobile Crowdsensing for
                                  Strategic Users With Private Data
                                  Quality  . . . . . . . . . . . . . . . . 1959--1972
               Zhenjie Yang and   
                   Yong Cui and   
                   Xin Wang and   
                 Yadong Liu and   
                 Minming Li and   
                Shihan Xiao and   
                     Chuming Li   Cost-Efficient Scheduling of Bulk
                                  Transfers in Inter-Datacenter WANs . . . 1973--1986
              Pablo Garrido and   
           Douglas J. Leith and   
                   Ramon Aguero   Joint Scheduling and Coding for Low
                                  In-Order Delivery Delay Over Lossy Paths
                                  With Delayed Feedback  . . . . . . . . . 1987--2000
                  Arjun Roy and   
                Rajdeep Das and   
                Hongyi Zeng and   
              Jasmeet Bagga and   
                Alex C. Snoeren   Understanding the Limits of Passive
                                  Realtime Datacenter Fault Detection and
                                  Localization . . . . . . . . . . . . . . 2001--2014
                   Xuya Jia and   
                     Dan Li and   
                   Jing Zhu and   
                     Yong Jiang   Metro: an Efficient Traffic Fast
                                  Rerouting Scheme With Low Overhead . . . 2015--2027
            Christos Pappas and   
                  Taeho Lee and   
        Raphael M. Reischuk and   
         Pawel Szalachowski and   
                  Adrian Perrig   Network Transparency for Better Internet
                                  Security . . . . . . . . . . . . . . . . 2028--2042
                  Kang Yang and   
             Tianzhang Xing and   
                   Yang Liu and   
               Zhenjiang Li and   
              Xiaoqing Gong and   
             Xiaojiang Chen and   
                    Dingyi Fang   cDeepArch: a Compact Deep Neural Network
                                  Architecture for Mobile Sensing  . . . . 2043--2055
              Reza Motamedi and   
            Bahador Yeganeh and   
Balakrishnan Chandrasekaran and   
                Reza Rejaie and   
             Bruce M. Maggs and   
               Walter Willinger   On Mapping the Interconnections in
                                  Today's Internet . . . . . . . . . . . . 2056--2070
              Matthias Rost and   
                  Stefan Schmid   Virtual Network Embedding
                                  Approximations: Leveraging Randomized
                                  Rounding . . . . . . . . . . . . . . . . 2071--2084
             Mikhail Hayhoe and   
               Fady Alajaji and   
             Bahman Gharesifard   Curing Epidemics on Networks Using a
                                  Polya Contagion Model  . . . . . . . . . 2085--2097
               Reuven Cohen and   
                    Yuval Nezri   Cardinality Estimation in a Virtualized
                                  Network Device Using Online Machine
                                  Learning . . . . . . . . . . . . . . . . 2098--2110
            George Darzanos and   
      Iordanis Koutsopoulos and   
            George D. Stamoulis   Cloud Federations: Economics, Games and
                                  Benefits . . . . . . . . . . . . . . . . 2111--2124
               Luca Baldesi and   
         Athina Markopoulou and   
               Carter T. Buttsc   Spectral Graph Forge: a Framework for
                                  Generating Synthetic Graphs With a
                                  Target Modularity  . . . . . . . . . . . 2125--2136
                Benny Van Houdt   Randomized Work Stealing Versus Sharing
                                  in Large-Scale Systems With
                                  Non-Exponential Job Sizes  . . . . . . . 2137--2149
          Kate Ching-Ju Lin and   
              Kai-Cheng Hsu and   
                    Hung-Yu Wei   Inter-Client Interference Cancellation
                                  for Full-Duplex Networks With
                                  Half-Duplex Clients  . . . . . . . . . . 2150--2163
               Kaiming Shen and   
                     Wei Yu and   
               Licheng Zhao and   
              Daniel P. Palomar   Optimization of MIMO Device-to-Device
                                  Networks via Matrix Fractional
                                  Programming: a
                                  Minorization--Maximization Approach  . . 2164--2177

IEEE\slash ACM Transactions on Networking
Volume 27, Number 6, December, 2019

                Alex X. Liu and   
                    Eric Norige   A De-Compositional Approach to Regular
                                  Expression Matching for Network Security 2179--2191
                 Orly Avner and   
                    Shie Mannor   Multi-User Communication Networks: a
                                  Coordinated Multi-Armed Bandit Approach  2192--2207
                Haiming Jin and   
                Baoxiang He and   
                      Lu Su and   
            Klara Nahrstedt and   
                   Xinbing Wang   Data-Driven Pricing for Sensing Effort
                                  Elicitation in Mobile Crowd Sensing
                                  Systems  . . . . . . . . . . . . . . . . 2208--2221
                    Kun Xie and   
               Xiangge Wang and   
                   Xin Wang and   
               Yuxiang Chen and   
                Gaogang Xie and   
              Yudian Ouyang and   
                 Jigang Wen and   
               Jiannong Cao and   
                   Dafang Zhang   Accurate Recovery of Missing Network
                                  Measurement Data With Localized Tensor
                                  Completion . . . . . . . . . . . . . . . 2222--2235
                  Tong Yang and   
                  Jie Jiang and   
                   Peng Liu and   
                  Qun Huang and   
                Junzhi Gong and   
                  Yang Zhou and   
                   Rui Miao and   
                Xiaoming Li and   
                    Steve Uhlig   Adaptive Measurements Using One Elastic
                                  Sketch . . . . . . . . . . . . . . . . . 2236--2251
            Pedro Reviriego and   
              Ori Rottenstreich   The Tandem Counting Bloom Filter --- It
                                  Takes Two Counters to Tango  . . . . . . 2252--2265
       Mehmet Fatih Akta\cs and   
                 Emina Soljanin   Straggler Mitigation at Scale  . . . . . 2266--2279
                 Daqing Yun and   
                Chase Q. Wu and   
        Nageswara S. V. Rao and   
            Rajkumar Kettimuthu   Advising Big Data Transfer Over
                                  Dedicated Connections Based on Profiling
                                  Optimization . . . . . . . . . . . . . . 2280--2293
                  Haiqin Wu and   
              Liangmin Wang and   
               Guoliang Xue and   
                  Jian Tang and   
                     Dejun Yang   Enabling Data Trustworthiness and User
                                  Privacy in Mobile Crowdsensing . . . . . 2294--2307
                   Guo Chen and   
                 Yuanwei Lu and   
                   Bojie Li and   
                    Kun Tan and   
            Yongqiang Xiong and   
                 Peng Cheng and   
             Jiansong Zhang and   
              Thomas Moscibroda   MP-RDMA: Enabling RDMA With Multi-Path
                                  Transport in Datacenters . . . . . . . . 2308--2323
                  Chen Chen and   
                    Lei Liu and   
                    Tie Qiu and   
           Dapeng Oliver Wu and   
                    Zhiyuan Ren   Delay-Aware Grid-Based Geographic
                                  Routing in Urban VANETs: a Backbone
                                  Approach . . . . . . . . . . . . . . . . 2324--2337
                  Jinbin Hu and   
               Jiawei Huang and   
                  Wenjun Lv and   
                 Yutao Zhou and   
               Jianxin Wang and   
                        Tian He   CAPS: Coding-Based Adaptive Packet
                                  Spraying to Reduce Flow Completion Time
                                  in Data Center . . . . . . . . . . . . . 2338--2353
                  Qian Chen and   
            Xiao Juan Zhang and   
                Wei Lih Lim and   
              Yuen Sam Kwok and   
                      Sumei Sun   High Reliability, Low Latency and Cost
                                  Effective Network Planning for
                                  Industrial Wireless Mesh Networks  . . . 2354--2362
       Francesco Malandrino and   
  Carla Fabiana Chiasserini and   
               Gil Einziger and   
               Gabriel Scalosub   Reducing Service Deployment Cost Through
                                  VNF Sharing  . . . . . . . . . . . . . . 2363--2376
             Mauro Cociglio and   
          Giuseppe Fioccola and   
            Guido Marchetto and   
               Amedeo Sapio and   
                 Riccardo Sisto   Multipoint Passive Monitoring in Packet
                                  Networks . . . . . . . . . . . . . . . . 2377--2390
                  Ping Zhao and   
               Hongbo Jiang and   
                     Jie Li and   
                 Fanzi Zeng and   
                   Xiao Zhu and   
                    Kun Xie and   
                 Guanglin Zhang   Synthesizing Privacy Preserving Traces:
                                  Enhancing Plausibility With Social
                                  Networks . . . . . . . . . . . . . . . . 2391--2404
        Anura P. Jayasumana and   
           Randy Paffenroth and   
            Gunjan Mahindre and   
           Sridhar Ramasamy and   
              Kelum Gajamannage   Network Topology Mapping From Partial
                                  Virtual Coordinates and Graph Geodesics  2405--2417
                   Yang Liu and   
                      Bo Li and   
       Brian D. O. Anderson and   
                    Guodong Shi   Clique Gossiping . . . . . . . . . . . . 2418--2431
             Sepideh Nazemi and   
               Kin K. Leung and   
                Ananthram Swami   Distributed Optimization Framework for
                                  In-Network Data Processing . . . . . . . 2432--2443
           Elaine Y.-N. Sun and   
              Hsiao-Chun Wu and   
              Scott C.-H. Huang   Theoretical Analysis of Various
                                  Software-Defined Multiplexing Codes  . . 2444--2457
                  Han Zhang and   
                Haijun Geng and   
                   Yahui Li and   
                    Xia Yin and   
                Xingang Shi and   
              Zhiliang Wang and   
                Qianhong Wu and   
                    Jianwei Liu   DA&FD-Deadline-Aware and Flow
                                  Duration-Based Rate Control for Mixed
                                  Flows in DCNs  . . . . . . . . . . . . . 2458--2471
                Zhenhua Han and   
               Haisheng Tan and   
              Xiang-Yang Li and   
       Shaofeng H.-C. Jiang and   
                  Yupeng Li and   
              Francis C. M. Lau   OnDisc: Online Latency-Sensitive Job
                                  Dispatching and Scheduling in
                                  Heterogeneous Edge-Clouds  . . . . . . . 2472--2485


IEEE\slash ACM Transactions on Networking
Volume 28, Number 1, February, 2020

                Haipeng Dai and   
                    Meng Li and   
                Alex X. Liu and   
                Jiaqi Zheng and   
                    Guihai Chen   Finding Persistent Items in Distributed
                                  Datasets . . . . . . . . . . . . . . . . 1--14
                Rajat Talak and   
             Sertac Karaman and   
                  Eytan Modiano   Optimizing Information Freshness in
                                  Wireless Networks Under General
                                  Interference Constraints . . . . . . . . 15--28
        G. Enrico Santagati and   
                  Neil Dave and   
                Tommaso Melodia   Design and Performance Evaluation of an
                                  Implantable Ultrasonic Networking
                                  Platform for the Internet of Medical
                                  Things . . . . . . . . . . . . . . . . . 29--42
                   Yan Qiao and   
                   Jun Jiao and   
                Xinhong Cui and   
                       Yuan Rao   Robust Loss Inference in the Presence of
                                  Noisy Measurements and Hidden Fault
                                  Diagnosis  . . . . . . . . . . . . . . . 43--56
                   Jia Zhao and   
             Jiangchuan Liu and   
               Haiyang Wang and   
                     Chi Xu and   
                   Wei Gong and   
                   Changqiao Xu   Measurement, Analysis, and Enhancement
                                  of Multipath TCP Energy Efficiency for
                                  Datacenters  . . . . . . . . . . . . . . 57--70
              Guocheng Liao and   
                    Xu Chen and   
                  Jianwei Huang   Prospect Theoretic Analysis of
                                  Privacy-Preserving Mechanism . . . . . . 71--83
               Seokhyun Kim and   
                  Kimin Lee and   
               Yeonkeun Kim and   
                Jinwoo Shin and   
              Seungwon Shin and   
                     Song Chong   Dynamic Control for On-Demand
                                  Interference-Managed WLAN
                                  Infrastructures  . . . . . . . . . . . . 84--97
               Danfeng Shan and   
               Fengyuan Ren and   
                 Peng Cheng and   
                    Ran Shu and   
                 Chuanxiong Guo   Observing and Mitigating Micro-Burst
                                  Traffic in Data Center Networks  . . . . 98--111
              Lorenzo Saino and   
             Ioannis Psaras and   
            Emilio Leonardi and   
                  George Pavlou   Load Imbalance and Caching Performance
                                  of Sharded Systems . . . . . . . . . . . 112--125
                Xiulong Liu and   
                 Sheng Chen and   
                    Jia Liu and   
                   Wenyu Qu and   
               Fengjun Xiao and   
                Alex X. Liu and   
               Jiannong Cao and   
                 Jiangchuan Liu   Fast and Accurate Detection of Unknown
                                  Tags for RFID Systems --- Hash
                                  Collisions are Desirable . . . . . . . . 126--139
               K. P. Naveen and   
                   Anurag Kumar   Coverage in One-Dimensional Wireless
                                  Networks With Infrastructure Nodes and
                                  Relay Extensions . . . . . . . . . . . . 140--153
                 Shuyi Chen and   
                 Xiqing Liu and   
                Tianyu Zhao and   
             Hsiao-Hwa Chen and   
                   Weixiao Meng   Performance Analysis of Joint
                                  Transmission Schemes in Ultra-Dense
                                  Networks --- A Unified Approach  . . . . 154--167
              Miralem Mehic and   
              Peppino Fazio and   
                Stefan Rass and   
            Oliver Maurhart and   
              Momtchil Peev and   
              Andreas Poppe and   
                 Jan Rozhon and   
             Marcin Niemiec and   
                Miroslav Voznak   A Novel Approach to Quality-of-Service
                                  Provisioning in Trusted Relay Quantum
                                  Key Distribution Networks  . . . . . . . 168--181
                 Ashwin Ganesan   Performance Guarantees of Distributed
                                  Algorithms for QoS in Wireless Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 182--195
                Zongqing Lu and   
                 Kevin Chan and   
            Rahul Urgaonkar and   
                Shiliang Pu and   
                Thomas La Porta   NetVision: On-Demand Video Processing in
                                  Wireless Networks  . . . . . . . . . . . 196--209
                  Minh Pham and   
              Doan B. Hoang and   
                  Zenon Chaczko   Congestion-Aware and Energy-Aware
                                  Virtual Network Embedding  . . . . . . . 210--223
                 Caixia Kou and   
                  Dedong Hu and   
               Jianhua Yuan and   
                      Wenbao Ai   Bisection and Exact Algorithms Based on
                                  the Lagrangian Dual for a
                                  Single-Constrained Shortest Path Problem 224--233
                 Xiong Wang and   
                    Qi Deng and   
                   Jing Ren and   
             Mehdi Malboubi and   
                 Sheng Wang and   
                Shizhong Xu and   
                 Chen-Nee Chuah   The Joint Optimization of Online Traffic
                                  Matrix Measurement and Traffic
                                  Engineering For Software-Defined
                                  Networks . . . . . . . . . . . . . . . . 234--247
              Yannis Thomas and   
   Merkourios Karaliopoulos and   
           George Xylomenos and   
              George C. Polyzos   Low Latency Friendliness for Multipath
                                  TCP  . . . . . . . . . . . . . . . . . . 248--261
     Sangeeta Bhattacharjee and   
           Tamaghna Acharya and   
               Uma Bhattacharya   Energy-Efficient Multicasting in Hybrid
                                  Cognitive Small Cell Networks: a
                                  Cross-Layer Approach . . . . . . . . . . 262--274
             Levente Csikor and   
         Márk Szalay and   
Gábor Rétvári and   
    Gergely Pongrácz and   
       Dimitrios P. Pezaros and   
      László Toka   Transition to SDN is HARMLESS: Hybrid
                                  Architecture for Migrating Legacy
                                  Ethernet Switches to SDN . . . . . . . . 275--288
            Alija Pa\vsi\'c and   
      Péter Babarczi and   
      János Tapolcai and   
Erika R. Bérczi-Kovács and   
Zoltán Király and   
            Lajos Rónyai   Minimum Cost Survivable Routing
                                  Algorithms for Generalized Diversity
                                  Coding . . . . . . . . . . . . . . . . . 289--300
                Xiuzhen Guo and   
                    Yuan He and   
             Xiaolong Zheng and   
              Liangcheng Yu and   
              Omprakash Gnawali   ZigFi: Harnessing Channel State
                                  Information for Cross-Technology
                                  Communication  . . . . . . . . . . . . . 301--311
                    Ze Yang and   
                  Kwan L. Yeung   SDN Candidate Selection in Hybrid IP/SDN
                                  Networks for Single Link Failure
                                  Protection . . . . . . . . . . . . . . . 312--321
                Jiachen Xue and   
    Muhammad Usama Chaudhry and   
            Balajee Vamanan and   
           T. N. Vijaykumar and   
            Mithuna Thottethodi   Dart: Divide and Specialize for Fast
                                  Response to Congestion in RDMA-Based
                                  Datacenter Networks  . . . . . . . . . . 322--335
                   Bin Tang and   
             Xiaoliang Wang and   
              Cam-Tu Nguyen and   
                  Baoliu Ye and   
                      Sanglu Lu   Construction of Subexponential-Size
                                  Optical Priority Queues With Switches
                                  and Fiber Delay Lines  . . . . . . . . . 336--346
                Amr Albanna and   
         Homayoun Yousefi'Zadeh   Congestion Minimization of LTE Networks:
                                  a Deep Learning Approach . . . . . . . . 347--359
                   Luoyi Fu and   
              Jiapeng Zhang and   
               Shuaiqi Wang and   
                   Xinyu Wu and   
               Xinbing Wang and   
                    Guihai Chen   De-Anonymizing Social Networks With
                                  Overlapping Community Structure  . . . . 360--375
                   Teng Liu and   
      Alhussein A. Abouzeid and   
                A. Agung Julius   Traffic Flow Control in Vehicular
                                  Multi-Hop Networks With Data Caching and
                                  Infrastructure Support . . . . . . . . . 376--386
                Takuro Fukunaga   Adaptive Algorithm for Finding Connected
                                  Dominating Sets in Uncertain Graphs  . . 387--398

IEEE\slash ACM Transactions on Networking
Volume 28, Number 2, April, 2020

               Qingjun Xiao and   
               Shigang Chen and   
                   You Zhou and   
                    Junzhou Luo   Estimating Cardinality for Arbitrarily
                                  Large Data Stream With Improved Memory
                                  Efficiency . . . . . . . . . . . . . . . 433--446
                   Wei Dong and   
                     Yi Gao and   
               Chenhong Cao and   
               Xiaoyu Zhang and   
                      Wenbin Wu   Universal Path Tracing for Large-Scale
                                  Sensor Networks  . . . . . . . . . . . . 447--460
               Jona Beysens and   
                  Qing Wang and   
             Ander Galisteo and   
       Domenico Giustiniano and   
                   Sofie Pollin   A Cell-Free Networking System With
                                  Visible Light  . . . . . . . . . . . . . 461--476
                Arjun Anand and   
         Gustavo de Veciana and   
              Sanjay Shakkottai   Joint Scheduling of URLLC and eMBB
                                  Traffic in $5$G Wireless Networks  . . . 477--490
            Alejandro Cohen and   
                 Asaf Cohen and   
                  Omer Gurewitz   Efficient Data Collection Over Multiple
                                  Access Wireless Sensors Network  . . . . 491--504
                Tingwei Liu and   
                 John C. S. Lui   FAVE: a Fast and Efficient Network Flow
                                  AVailability Estimation Method With
                                  Bounded Relative Error . . . . . . . . . 505--518
               Mingjun Xiao and   
                  Guoju Gao and   
                     Jie Wu and   
                Sheng Zhang and   
                 Liusheng Huang   Privacy-Preserving User Recruitment
                                  Protocol for Mobile Crowdsensing . . . . 519--532
              Matthew Clark and   
           Konstantinos Psounis   Optimizing Primary User Privacy in
                                  Spectrum Sharing Systems . . . . . . . . 533--546
                    Ge Wang and   
                 Haofan Cai and   
                  Chen Qian and   
                Jinsong Han and   
               Shouqian Shi and   
                     Xin Li and   
                   Han Ding and   
                     Wei Xi and   
                   Jizhong Zhao   Hu-Fu: Replay-Resilient RFID
                                  Authentication . . . . . . . . . . . . . 547--560
           Martino Trevisan and   
            Danilo Giordano and   
               Idilio Drago and   
   Maurizio Matteo Munaf\`o and   
                   Marco Mellia   Five Years at the Edge: Watching
                                  Internet From the ISP Network  . . . . . 561--574
                 Yilong Hui and   
                    Zhou Su and   
                    Tom H. Luan   Collaborative Content Delivery in
                                  Software-Defined Heterogeneous Vehicular
                                  Networks . . . . . . . . . . . . . . . . 575--587
          Novella Bartolini and   
                    Ting He and   
           Viviana Arrigoni and   
           Annalisa Massini and   
         Federico Trombetti and   
                Hana Khamfroush   On Fundamental Bounds on Failure
                                  Identifiability by Boolean Network
                                  Tomography . . . . . . . . . . . . . . . 588--601
                   Wei Wang and   
                  Shiyue He and   
                 Qian Zhang and   
                      Tao Jiang   Enabling Low-Power OFDM for IoT by
                                  Exploiting Asymmetric Clock Rates  . . . 602--611
               Yongrui Chen and   
                 Shuai Wang and   
                  Zhijun Li and   
                        Tian He   Reliable Physical-Layer Cross-Technology
                                  Communication With Emulation Error
                                  Correction . . . . . . . . . . . . . . . 612--624
        Georgios S. Paschos and   
        Apostolos Destounis and   
               George Iosifidis   Online Convex Optimization for Caching
                                  Networks . . . . . . . . . . . . . . . . 625--638
         Sameer G. Kulkarni and   
                  Wei Zhang and   
                Jinho Hwang and   
        Shriram Rajagopalan and   
         K. K. Ramakrishnan and   
               Timothy Wood and   
       Mayutan Arumaithurai and   
                    Xiaoming Fu   NFVnice: Dynamic Backpressure and
                                  Scheduling for NFV Service Chains  . . . 639--652
                 Wenjia Wei and   
                Kaiping Xue and   
              Jiangping Han and   
            David S. L. Wei and   
                    Peilin Hong   Shared Bottleneck-Based Congestion
                                  Control and Packet Scheduling for
                                  Multipath TCP  . . . . . . . . . . . . . 653--666
       Sla\dbarana Jo\vsilo and   
         György Dán   Computation Offloading Scheduling for
                                  Periodic Tasks in Mobile Edge Computing  667--680
                  Yahui Sun and   
            Daniel Rehfeldt and   
              Marcus Brazil and   
              Doreen Thomas and   
                Saman Halgamuge   A Physarum-Inspired Algorithm for
                                  Minimum-Cost Relay Node Placement in
                                  Wireless Sensor Networks . . . . . . . . 681--694
         Sameer G. Kulkarni and   
                  Guyue Liu and   
         K. K. Ramakrishnan and   
       Mayutan Arumaithurai and   
               Timothy Wood and   
                    Xiaoming Fu   REINFORCE: Achieving Efficient Failure
                                  Resiliency for Network Function
                                  Virtualization-Based Services  . . . . . 695--708
                Ajay Badita and   
              Parimal Parag and   
                Vaneet Aggarwal   Optimal Server Selection for Straggler
                                  Mitigation . . . . . . . . . . . . . . . 709--721
      Jaya Prakash Champati and   
         Hussein Al-Zubaidy and   
                    James Gross   Transient Analysis for Multihop Wireless
                                  Networks Under Static Routing  . . . . . 722--735
                Michael Lin and   
          Novella Bartolini and   
        Michael Giallorenzo and   
             Thomas F. La Porta   On Interference Aware Power Adjustment
                                  and Scheduling in Femtocell Networks . . 736--749
                    Sen Lin and   
              Junshan Zhang and   
                       Lei Ying   Crowdsensing for Spectrum Discovery: a
                                  Waze-Inspired Design via Smartphone
                                  Sensing  . . . . . . . . . . . . . . . . 750--763
               Tingjun Chen and   
        Jelena Diakonikolas and   
              Javad Ghaderi and   
                    Gil Zussman   Hybrid Scheduling in Heterogeneous Half-
                                  and Full-Duplex Wireless Networks  . . . 764--777
                  Hani Sami and   
               Azzam Mourad and   
                 Wassim El-Hajj   Vehicular-OBUs-As-On-Demand-Fogs:
                                  Resource and Context Aware Deployment of
                                  Containerized Micro-Services . . . . . . 778--790
              Matthias Rost and   
                  Stefan Schmid   On the Hardness and Inapproximability of
                                  Virtual Network Embeddings . . . . . . . 791--803
               Xijian Zhong and   
                    Yan Guo and   
                    Ning Li and   
                  Yancheng Chen   Joint Optimization of Relay Deployment,
                                  Channel Allocation, and Relay Assignment
                                  for UAVs-Aided D$2$D Networks  . . . . . 804--817
                Ali Maatouk and   
             Mohamad Assaad and   
             Anthony Ephremides   On the Age of Information in a CSMA
                                  Environment  . . . . . . . . . . . . . . 818--831
                 Haibo Wang and   
            Jessie Hui Wang and   
                Jilong Wang and   
               Weizhen Dang and   
                Jing'an Xue and   
                 Fenghua Li and   
                    Jinzhe Shan   Squeezing the Gap: an Empirical Study on
                                  DHCP Performance in a Large-Scale
                                  Wireless Network . . . . . . . . . . . . 832--845

IEEE\slash ACM Transactions on Networking
Volume 28, Number 3, June, 2020

                    Kun Xie and   
               Yuxiang Chen and   
                   Xin Wang and   
                Gaogang Xie and   
               Jiannong Cao and   
                     Jigang Wen   Accurate and Fast Recovery of Network
                                  Monitoring Data: a GPU Accelerated
                                  Matrix Completion  . . . . . . . . . . . 958--971
                   Jie Wang and   
                 Wenye Wang and   
                     Cliff Wang   Modeling and Analysis of Conflicting
                                  Information Propagation in a Finite Time
                                  Horizon  . . . . . . . . . . . . . . . . 972--985
         Gioacchino Tangari and   
      Marinos Charalambides and   
              Daphne Tuncer and   
                  George Pavlou   Accuracy-Aware Adaptive Traffic
                                  Monitoring for Software Dataplanes . . . 986--1001
                Yongce Chen and   
                  Yan Huang and   
                     Yi Shi and   
              Y. Thomas Hou and   
                Wenjing Lou and   
                Sastry Kompella   On DoF-Based Interference Cancellation
                                  Under General Channel Rank Conditions    1002--1016
              Avinash Mohan and   
             Aditya Gopalan and   
                   Anurag Kumar   Reduced-State, Optimal Scheduling for
                                  Decentralized Medium Access Control of a
                                  Class of Wireless Networks . . . . . . . 1017--1032
                    Meng Li and   
                Haipeng Dai and   
                Xiaoyu Wang and   
                    Rui Xia and   
                Alex X. Liu and   
                    Guihai Chen   Thresholded Monitoring in Distributed
                                  Data Streams . . . . . . . . . . . . . . 1033--1046
    Konstantinos Poularakis and   
               Jaime Llorca and   
          Antonia M. Tulino and   
                 Ian Taylor and   
             Leandros Tassiulas   Service Placement and Request Routing in
                                  MEC Networks With Storage, Computation,
                                  and Communication Constraints  . . . . . 1047--1060
                  Ziyue Luo and   
                       Chuan Wu   An Online Algorithm for VNF Service
                                  Chain Scaling in Datacenters . . . . . . 1061--1073
                Juan Brenes and   
Alberto García-Martínez and   
            Marcelo Bagnulo and   
                 Andra Lutu and   
                Cristel Pelsser   Power Prefixes Prioritization for
                                  Smarter BGP Reconvergence  . . . . . . . 1074--1087
          Vitalii Demianiuk and   
           Sergey Nikolenko and   
            Pavel Chuprikov and   
                   Kirill Kogan   New Alternatives to Optimize Policy
                                  Classifiers  . . . . . . . . . . . . . . 1088--1101
                   Bo Cheng and   
                 Shoulu Hou and   
                  Ming Wang and   
                 Shuai Zhao and   
                  Junliang Chen   HSOP: a Hybrid Service Orchestration
                                  Platform for Internet-Telephony Networks 1102--1115
               Xiaofeng Cao and   
               Guoming Tang and   
                   Deke Guo and   
                     Yan Li and   
                  Weiming Zhang   Edge Federation: Towards an Integrated
                                  Service Provisioning Model . . . . . . . 1116--1129
              Milad Mahdian and   
             Armin Moharrer and   
          Stratis Ioannidis and   
                     Edmund Yeh   Kelly Cache Networks . . . . . . . . . . 1130--1143
                   Ning Xie and   
              Shengli Zhang and   
                    Alex X. Liu   Physical-Layer Authentication in
                                  Non-Orthogonal Multiple Access Systems   1144--1157
            Ramon Fernandes and   
        César Marcon and   
            Rodrigo Cataldo and   
       Johanna Sepúlveda   Using Smart Routing for Secure and
                                  Dependable NoC-Based MPSoCs  . . . . . . 1158--1171
              Ran Ben Basat and   
                Xiaoqi Chen and   
               Gil Einziger and   
              Ori Rottenstreich   Designing Heavy-Hitter Detection
                                  Algorithms for Programmable Switches . . 1172--1185
             Shay Vargaftik and   
             Isaac Keslassy and   
                     Ariel Orda   LSQ: Load Balancing in Large-Scale
                                  Heterogeneous Systems With Multiple
                                  Dispatchers  . . . . . . . . . . . . . . 1186--1198
            Ali Yekkehkhany and   
                    Rakesh Nagi   Blind GB-PANDAS: a Blind
                                  Throughput-Optimal Load Balancing
                                  Algorithm for Affinity Scheduling  . . . 1199--1212
           Alia Asheralieva and   
                   Dusit Niyato   Combining Contract Theory and Lyapunov
                                  Optimization for Content Sharing With
                                  Edge Caching and Device-to-Device
                                  Communications . . . . . . . . . . . . . 1213--1226
              Yongmin Zhang and   
               Xiaolong Lan and   
                     Ju Ren and   
                        Lin Cai   Efficient Computing Resource Sharing for
                                  Mobile Edge-Cloud Computing Networks . . 1227--1240
                 Qingyu Liu and   
                   Lei Deng and   
                 Haibo Zeng and   
                   Minghua Chen   A Tale of Two Metrics in Network Delay
                                  Optimization . . . . . . . . . . . . . . 1241--1254
               Fangxin Wang and   
                 Cong Zhang and   
                  Feng Wang and   
             Jiangchuan Liu and   
                  Yifei Zhu and   
               Haitian Pang and   
                     Lifeng Sun   DeepCast: Towards Personalized QoE for
                                  Edge-Assisted Crowdcast With Deep
                                  Reinforcement Learning . . . . . . . . . 1255--1268
                   Kai Ding and   
     Homayoun Yousefi'zadeh and   
                 Faryar Jabbari   Connectivity Maintenance in Mobile
                                  Networks . . . . . . . . . . . . . . . . 1269--1282
              Damiano Carra and   
            Giovanni Neglia and   
               Pietro Michiardi   Elastic Provisioning of Cloud Caches: a
                                  Cost-Aware TTL Approach  . . . . . . . . 1283--1296
               Youlin Zhang and   
               Shigang Chen and   
                   You Zhou and   
                   Yuguang Fang   Missing-Tag Detection With Unknown Tags  1297--1310
          Francesca Fossati and   
            Stefano Moretti and   
              Patrice Perny and   
                  Stefano Secci   Multi-Resource Allocation for Network
                                  Slicing  . . . . . . . . . . . . . . . . 1311--1324
                    Jing Fu and   
                     Bill Moran   Energy-Efficient Job-Assignment Policy
                                  With Asymptotically Guaranteed
                                  Performance Deviation  . . . . . . . . . 1325--1338
                 Xiaocan Li and   
                    Kun Xie and   
                   Xin Wang and   
                Gaogang Xie and   
              Dongliang Xie and   
                  Zhenyu Li and   
                 Jigang Wen and   
                Zulong Diao and   
                      Tian Wang   Quick and Accurate False Data Detection
                                  in Mobile Crowd Sensing  . . . . . . . . 1339--1352
       Attila K\Horösi and   
András Gulyás and   
           Zalan Heszberger and   
József Bíró and   
Gábor Rétvári   On the Memory Requirement of Hop-by-Hop
                                  Routing: Tight Bounds and Optimal
                                  Address Spaces . . . . . . . . . . . . . 1353--1363
                    Yang Li and   
              Jianwei Zheng and   
                 Zhenhua Li and   
                 Yunhao Liu and   
                  Feng Qian and   
                    Sen Bai and   
                    Yao Liu and   
                   Xianlong Xin   Understanding the Ecosystem and
                                  Addressing the Fundamental Concerns of
                                  Commercial MVNO  . . . . . . . . . . . . 1364--1377

IEEE\slash ACM Transactions on Networking
Volume 28, Number 4, August, 2020

      Mohammad Hassan Lotfi and   
             Saswati Sarkar and   
                 George Kesidis   Is Non-Neutrality Profitable for the
                                  Stakeholders of the Internet Market? . . 1435--1448
               Ankur Sarker and   
                 Chenxi Qiu and   
                   Haiying Shen   Connectivity Maintenance for
                                  Next-Generation Decentralized Vehicle
                                  Platoon Networks . . . . . . . . . . . . 1449--1462
                   He Huang and   
                   Yu-E Sun and   
                  Chaoyi Ma and   
               Shigang Chen and   
                   You Zhou and   
               Wenjian Yang and   
               Shaojie Tang and   
                  Hongli Xu and   
                       Yan Qiao   An Efficient $K$-Persistent Spread
                                  Estimator for Traffic Measurement in
                                  High-Speed Networks  . . . . . . . . . . 1463--1476
                  Yilei Lin and   
                    Ting He and   
              Shiqiang Wang and   
                 Kevin Chan and   
               Stephen Pasteris   Looking Glass of NFV: Inferring the
                                  Structure and State of NFV Network From
                                  External Observations  . . . . . . . . . 1477--1490
               Zhangyu Guan and   
                    Nan Cen and   
            Tommaso Melodia and   
             Scott M. Pudlewski   Distributed Joint Power, Association and
                                  Flight Control for Massive-MIMO
                                  Self-Organizing Flying Drones  . . . . . 1491--1505
           Sudeep Bhattarai and   
              Jung-Min Park and   
                   William Lehr   Dynamic Exclusion Zones for Protecting
                                  Primary Users in Database-Driven
                                  Spectrum Sharing . . . . . . . . . . . . 1506--1519
              Reza Banirazi and   
          Edmond Jonckheere and   
         Bhaskar Krishnamachari   Heat-Diffusion: Pareto Optimal Dynamic
                                  Routing for Time-Varying Wireless
                                  Networks . . . . . . . . . . . . . . . . 1520--1533
                  Anfu Zhou and   
                Shaoqing Xu and   
                  Song Wang and   
               Jingqi Huang and   
              Shaoyuan Yang and   
                   Teng Wei and   
                Xinyu Zhang and   
                     Huadong Ma   Robotic Millimeter-Wave Wireless
                                  Networks . . . . . . . . . . . . . . . . 1534--1549
      Wojciech Kabaci\'nski and   
             Mustafa Abdulsahib   Wide-Sense Nonblocking
                                  Converting-Space-Converting Switching
                                  Node Architecture Under XsVarSWITCH
                                  Control Algorithm  . . . . . . . . . . . 1550--1561
                Zengfu Wang and   
                  Qing Wang and   
                 Bill Moran and   
                 Moshe Zukerman   Optimal Submarine Cable Path Planning
                                  and Trunk-and-Branch Tree Network
                                  Topology Design  . . . . . . . . . . . . 1562--1572
                  Ying Tian and   
              Zhiliang Wang and   
                    Xia Yin and   
                Xingang Shi and   
                 Yingya Guo and   
                Haijun Geng and   
                    Jiahai Yang   Traffic Engineering in Partially
                                  Deployed Segment Routing Over IPv6
                                  Network With Deep Reinforcement Learning 1573--1586
             Chenglong Shao and   
                Hoorin Park and   
                 Heejun Roh and   
                 Wonjun Lee and   
                      Hyoil Kim   PolarScout: Wi-Fi Interference-Resilient
                                  ZigBee Communication via Shell-Shaping   1587--1600
                    Kun Xie and   
               Yuxiang Chen and   
                   Xin Wang and   
                Gaogang Xie and   
               Jiannong Cao and   
                 Jigang Wen and   
             Guangming Yang and   
                      Jiaqi Sun   Accurate and Fast Recovery of Network
                                  Monitoring Data With GPU-Accelerated
                                  Tensor Completion  . . . . . . . . . . . 1601--1614
          Vignesh Sivaraman and   
            Dibyajyoti Guha and   
                  Biplab Sikdar   Optimal Pending Interest Table Size for
                                  ICN With Mobile Producers  . . . . . . . 1615--1628
                   Zhe Wang and   
                 Yifeng Cao and   
                Linghe Kong and   
                Guihai Chen and   
                   Jiadi Yu and   
               Shaojie Tang and   
                  Yingying Chen   Reference Waveforms Forward Concurrent
                                  Transmissions in ZigBee Communications   1629--1642
                   Yixin Li and   
                    Bin Cao and   
                 Mugen Peng and   
                 Long Zhang and   
                  Lei Zhang and   
                Daquan Feng and   
                      Jihong Yu   Direct Acyclic Graph-Based Ledger for
                                  Internet of Things: Performance and
                                  Security Analysis  . . . . . . . . . . . 1643--1656
Konstantinos Konstantinidis and   
             Aditya Ramamoorthy   Resolvable Designs for Speeding Up
                                  Distributed Computing  . . . . . . . . . 1657--1670
              Guocheng Liao and   
                    Xu Chen and   
                  Jianwei Huang   Social-Aware Privacy-Preserving
                                  Mechanism for Correlated Data  . . . . . 1671--1683
                Sheng Zhang and   
                   Yu Liang and   
                  Jidong Ge and   
               Mingjun Xiao and   
                         Jie Wu   Provably Efficient Resource Allocation
                                  for Edge Service Entities Using Hermes   1684--1697
              Kevin Spiteri and   
            Rahul Urgaonkar and   
            Ramesh K. Sitaraman   BOLA: Near-Optimal Bitrate Adaptation
                                  for Online Videos  . . . . . . . . . . . 1698--1711
                    Yue Cao and   
     Ahmed Osama Fathy Atya and   
           Shailendra Singh and   
                Zhiyun Qian and   
  Srikanth V. Krishnamurthy and   
         Thomas F. La Porta and   
     Prashant Krishnamurthy and   
                    Lisa Marvel   Packet Header Obfuscation Using MIMO . . 1712--1725
              Huynh Tu Dang and   
            Pietro Bressana and   
                   Han Wang and   
                 Ki Suh Lee and   
              Noa Zilberman and   
         Hakim Weatherspoon and   
               Marco Canini and   
            Fernando Pedone and   
            Robert Soulé   P4xos: Consensus as a Network Service    1726--1738
                 Rahul Vaze and   
              Jayakrishnan Nair   Multiple Server SRPT With Speed Scaling
                                  Is Competitive . . . . . . . . . . . . . 1739--1751
               Songtao Wang and   
                     Dan Li and   
                 Yang Cheng and   
                Jinkun Geng and   
                Yanshu Wang and   
                 Shuai Wang and   
                 Shutao Xia and   
                    Jianping Wu   A Scalable, High-Performance, and
                                  Fault-Tolerant Network Architecture for
                                  Distributed Machine Learning . . . . . . 1752--1764
                Rajat Talak and   
             Sertac Karaman and   
                  Eytan Modiano   Improving Age of Information in Wireless
                                  Networks With Perfect Channel State
                                  Information  . . . . . . . . . . . . . . 1765--1778
       Sarhad Arisdakessian and   
           Omar Abdel Wahab and   
               Azzam Mourad and   
                 Hadi Otrok and   
                    Nadjia Kara   FoGMatch: an Intelligent Multi-Criteria
                                  IoT-Fog Scheduling Approach Using Game
                                  Theory . . . . . . . . . . . . . . . . . 1779--1789
                   Yidan Hu and   
                      Rui Zhang   A Spatiotemporal Approach for Secure
                                  Crowdsourced Radio Environment Map
                                  Construction . . . . . . . . . . . . . . 1790--1803
                 Zhenlin An and   
             Qiongzheng Lin and   
                   Lei Yang and   
                    Wei Lou and   
                        Lei Xie   Acquiring Bloom Filters Across
                                  Commercial RFIDs in Physical Layer . . . 1804--1817
   Pedram Kheirkhah Sangdeh and   
           Hossein Pirayesh and   
               Adnan Quadri and   
                  Huacheng Zeng   A Practical Spectrum Sharing Scheme for
                                  Cognitive Radio Networks: Design and
                                  Experiments  . . . . . . . . . . . . . . 1818--1831
                   Yuqi Fan and   
                Wenlong Liu and   
                    Dan Guo and   
                   Weili Wu and   
                     Dingzhu Du   Shuffle Scheduling for MapReduce Jobs
                                  Based on Periodic Network Status . . . . 1832--1844

IEEE\slash ACM Transactions on Networking
Volume 28, Number 5, October, 2020

       Alireza Ameli Renani and   
                  Jun Huang and   
              Guoliang Xing and   
   Abdol-Hossein Esfahanian and   
                      Weiguo Wu   Harnessing Hardware Defects for
                                  Improving Wireless Link Performance  . . 1913--1924
                  Ruomu Hou and   
                Irvan Jahja and   
                    Loi Luu and   
             Prateek Saxena and   
                     Haifeng Yu   Randomized View Reconciliation in
                                  Permissionless Distributed Systems . . . 1925--1938
          Dheeraj Narasimha and   
        Srinivas Shakkottai and   
                       Lei Ying   A Mean Field Game Analysis of
                                  Distributed MAC in Ultra-Dense
                                  Multichannel Wireless Networks . . . . . 1939--1952
            Mohammed Hawari and   
Juan-Antonio Cordero-Fuertes and   
                 Thomas Clausen   High-Accuracy Packet Pacing on Commodity
                                  Servers for Constant-Rate Flows  . . . . 1953--1967
              Nai-Wen Chang and   
                 Sun-Yuan Hsieh   Conditional Diagnosability of
                                  Alternating Group Networks Under the PMC
                                  Model  . . . . . . . . . . . . . . . . . 1968--1980
Fardin Derogarian Miyandoab and   
 João Canas Ferreira and   
Vítor M. Grade Tavares and   
José Machado da Silva and   
              Fernando J. Velez   A Multifunctional Integrated Circuit
                                  Router for Body Area Network Wearable
                                  Systems  . . . . . . . . . . . . . . . . 1981--1994
                      Ye Li and   
                   Hong Xie and   
             John C. S. Lui and   
             Kenneth L. Calvert   Quantifying Deployability and
                                  Evolvability of Future Internet
                                  Architectures via Economic Models  . . . 1995--2008
                     Hao Li and   
               Zhengda Bian and   
                 Peng Zhang and   
                   Zhun Sun and   
               Chengchen Hu and   
                   Qiang Fu and   
                   Tian Pan and   
                         Jia Lv   Application-Oblivious L7 Parsing Using
                                  Recurrent Neural Networks  . . . . . . . 2009--2022
                    Jia Liu and   
               Shigang Chen and   
                   Min Chen and   
               Qingjun Xiao and   
                     Lijun Chen   Pose Sensing With a Single RFID Tag  . . 2023--2036
               Haojun Huang and   
                  Wang Miao and   
                 Geyong Min and   
           Chengqiang Huang and   
                   Xu Zhang and   
                      Chen Wang   Resilient Range-Based $d$-Dimensional
                                  Localization for Mobile Sensor Networks  2037--2050
             Zina Chkirbene and   
             Rachid Hadjidj and   
               Sebti Foufou and   
                   Ridha Hamila   LaScaDa: a Novel Scalable Topology for
                                  Data Center Network  . . . . . . . . . . 2051--2064
             Sara El Alaoui and   
               Byrav Ramamurthy   MARS: a Multi-Attribute Routing and
                                  Scheduling Algorithm for DTN
                                  Interplanetary Networks  . . . . . . . . 2065--2076
    Nurullah Karakoç and   
             Anna Scaglione and   
            Angelia Nedi\'c and   
               Martin Reisslein   Multi-Layer Decomposition of Network
                                  Utility Maximization Problems  . . . . . 2077--2091
                Yutong Zhai and   
                  Hongli Xu and   
                 Haibo Wang and   
                  Zeyu Meng and   
                       He Huang   Joint Routing and Sketch Configuration
                                  in Software-Defined Networking . . . . . 2092--2105
               Conor Sexton and   
           Nicola Marchetti and   
                Luiz A. DaSilva   On Provisioning Slices and Overbooking
                                  Resources in Service Tailored Networks
                                  of the Future  . . . . . . . . . . . . . 2106--2119
                    Si Chen and   
                   Wei Gong and   
                   Jia Zhao and   
                 Jiangchuan Liu   High-Throughput and Robust Rate
                                  Adaptation for Backscatter Networks  . . 2120--2131
                 Qingyu Liu and   
                 Haibo Zeng and   
                   Minghua Chen   Network Utility Maximization Under
                                  Maximum Delay Constraints and Throughput
                                  Requirements . . . . . . . . . . . . . . 2132--2145
           Hooshang Ghasemi and   
             Aditya Ramamoorthy   Asynchronous Coded Caching With Uncoded
                                  Prefetching  . . . . . . . . . . . . . . 2146--2159
                    Jian Su and   
                Alex X. Liu and   
             Zhengguo Sheng and   
                   Yongrui Chen   A Partitioning Approach to RFID
                                  Identification . . . . . . . . . . . . . 2160--2173
               Youlin Zhang and   
               Shigang Chen and   
                   You Zhou and   
        Olufemi O. Odegbile and   
                   Yuguang Fang   Efficient Anonymous Temporal-Spatial
                                  Joint Estimation at Category Level Over
                                  Multiple Tag Sets With Unreliable
                                  Channels . . . . . . . . . . . . . . . . 2174--2187
               Dingwen Yuan and   
              Hsuan-Yin Lin and   
           Jörg Widmer and   
               Matthias Hollick   Optimal and Approximation Algorithms for
                                  Joint Routing and Scheduling in
                                  Millimeter-Wave Cellular Networks  . . . 2188--2202
           Francesco Devoti and   
               Ilario Filippini   Planning mm-Wave Access Networks Under
                                  Obstacle Blockages: a Reliability-Aware
                                  Approach . . . . . . . . . . . . . . . . 2203--2214
                Ali Maatouk and   
              Saad Kriouile and   
             Mohamad Assaad and   
             Anthony Ephremides   The Age of Incorrect Information: a New
                                  Performance Metric for Status Updates    2215--2228
             David A. Hayes and   
              Michael Welzl and   
              Simone Ferlin and   
                  David Ros and   
                  Safiqul Islam   Online Identification of Groups of Flows
                                  Sharing a Network Bottleneck . . . . . . 2229--2242
                  Huanle Xu and   
                   Yang Liu and   
            Wing Cheong Lau and   
              Tiantong Zeng and   
                    Jun Guo and   
                    Alex X. Liu   Online Resource Allocation With Machine
                                  Variability: a Bandit Perspective  . . . 2243--2256
                 Ziling Wei and   
                  Jinshu Su and   
               Baokang Zhao and   
                     Xicheng Lu   Distributed Opportunistic Scheduling in
                                  Cooperative Networks With RF Energy
                                  Harvesting . . . . . . . . . . . . . . . 2257--2270
              Jaeyoung Choi and   
               Sangwoo Moon and   
                   Jiin Woo and   
              Kyunghwan Son and   
                Jinwoo Shin and   
                        Yung Yi   Information Source Finding in Networks:
                                  Querying With Budgets  . . . . . . . . . 2271--2284
                  Peter Key and   
              Richard Steinberg   Pricing, Competition and Content for
                                  Internet Service Providers . . . . . . . 2285--2298
                 Cheng Chen and   
           Randall A. Berry and   
           Michael L. Honig and   
           Vijay G. Subramanian   Pricing, Bandwidth Allocation, and
                                  Service Competition in Heterogeneous
                                  Wireless Networks  . . . . . . . . . . . 2299--2308
                   Ning Xie and   
                 Le Ou-Yang and   
                    Alex X. Liu   A Machine Learning Approach to Blind
                                  Multi-Path Classification for Massive
                                  MIMO Systems . . . . . . . . . . . . . . 2309--2322

IEEE\slash ACM Transactions on Networking
Volume 28, Number 6, December, 2020

            Quang-Trung Luu and   
          Sylvaine Kerboeuf and   
        Alexandre Mouradian and   
                 Michel Kieffer   A Coverage-Aware Resource Provisioning
                                  Method for Network Slicing . . . . . . . 2393--2406
           Stefano Coniglio and   
      Luca Giovanni Gianoli and   
             Edoardo Amaldi and   
                 Antonio Capone   Elastic Traffic Engineering Subject to a
                                  Fair Bandwidth Allocation via Bilevel
                                  Programming  . . . . . . . . . . . . . . 2407--2420
      János Tapolcai and   
        Lajos Rónyai and   
         Balázs Vass and   
László Gyimóthi   Fast Enumeration of Regional Link
                                  Failures Caused by Disasters With
                                  Limited Size . . . . . . . . . . . . . . 2421--2434
                  Ali Munir and   
                    Ting He and   
          Ramya Raghavendra and   
                  Franck Le and   
                    Alex X. Liu   Network Scheduling and Compute Resource
                                  Aware Task Placement in Datacenters  . . 2435--2448
                Xiuzhen Guo and   
                    Yuan He and   
                 Xiaolong Zheng   WiZig: Cross-Technology Energy
                                  Communication Over a Noisy Channel . . . 2449--2460
               Guocong Quan and   
                   Jian Tan and   
                Atilla Eryilmaz   Counterintuitive Characteristics of
                                  Optimal Distributed LRU Caching Over
                                  Unreliable Channels  . . . . . . . . . . 2461--2474
             Jingxuan Zhang and   
                    Kai Gao and   
            Y. Richard Yang and   
                         Jun Bi   Prophet: Toward Fast, Error-Tolerant
                                  Model-Based Throughput Prediction for
                                  Reactive Flows in DC Networks  . . . . . 2475--2488
               Yuxuan Jiang and   
           Mohammad Shahrad and   
            David Wentzlaff and   
          Danny H. K. Tsang and   
                Carlee Joe-Wong   Burstable Instances for Clouds:
                                  Performance Modeling, Equilibrium
                                  Analysis, and Revenue Maximization . . . 2489--2502
                   Hao Zhou and   
               Xiaofeng Gao and   
                Jiaqi Zheng and   
                    Guihai Chen   Scheduling Relaxed Loop-Free Updates
                                  Within Tight Lower Bounds in SDNs  . . . 2503--2516
           Thomas Stahlbuhk and   
             Brooke Shrader and   
                  Eytan Modiano   Throughput Maximization in Uncooperative
                                  Spectrum Sharing Networks  . . . . . . . 2517--2530
             Zhanzhan Zhang and   
                    Yin Sun and   
         Ashutosh Sabharwal and   
               Zhiyong Chen and   
                        Bin Xia   Scheduling and Power Allocation Dampens
                                  the Negative Effect of Channel
                                  Misreporting in Massive MIMO . . . . . . 2531--2544
                Zhiwei Zhao and   
                 Geyong Min and   
                   Wei Dong and   
                    Xue Liu and   
                Weifeng Gao and   
                     Tao Gu and   
                  Minghang Yang   Exploiting Link Diversity for
                                  Performance-Aware and Repeatable
                                  Simulation in Low-Power Wireless
                                  Networks . . . . . . . . . . . . . . . . 2545--2558
           Ali Mohammadkhan and   
         K. K. Ramakrishnan and   
                  Vivek A. Jain   CleanG --- Improving the Architecture
                                  and Protocols for Future Cellular
                                  Networks With NFV  . . . . . . . . . . . 2559--2572
                Xianjin Xia and   
             Yuanqing Zheng and   
                         Tao Gu   FTrack: Parallel Decoding for LoRa
                                  Transmissions  . . . . . . . . . . . . . 2573--2586
           Muhammad Shahbaz and   
              Lalith Suresh and   
           Jennifer Rexford and   
              Nick Feamster and   
          Ori Rottenstreich and   
                    Mukesh Hira   Elmo: Source Routed Multicast for Public
                                  Clouds . . . . . . . . . . . . . . . . . 2587--2600
               Mark Shifrin and   
  Daniel S. Menasché and   
                 Asaf Cohen and   
             Dennis Goeckel and   
                  Omer Gurewitz   Optimal PHY Configuration in Wireless
                                  Networks . . . . . . . . . . . . . . . . 2601--2614
              Jinyong Chang and   
                  Yanyan Ji and   
                 Bilin Shao and   
                  Maozhi Xu and   
                        Rui Xue   Certificateless Homomorphic Signature
                                  Scheme for Network Coding  . . . . . . . 2615--2628
                 Jinlong E. and   
                   Yong Cui and   
                 Zhenhua Li and   
              Mingkang Ruan and   
                     Ennan Zhai   HyCloud: Tweaking Hybrid Cloud Storage
                                  Services for Cost-Efficient Filesystem
                                  Hosting  . . . . . . . . . . . . . . . . 2629--2642
                Lingnan Gao and   
              George N. Rouskas   Congestion Minimization for Service
                                  Chain Routing Problems With Path Length
                                  Considerations . . . . . . . . . . . . . 2643--2656
               Sicheng Zhao and   
                    Xing Wu and   
                     Zuqing Zhu   On Parallel and Hitless vSDN
                                  Reconfiguration  . . . . . . . . . . . . 2657--2670
              Fehmina Malik and   
         Manjesh K. Hanawal and   
                 Yezekael Hayel   Zero-Rating of Content and Its Effect on
                                  the Quality of Service in the Internet   2671--2684
                  Kemi Ding and   
                  Junshan Zhang   Multi-Party Privacy Conflict Management
                                  in Online Social Networks: a Network
                                  Game Perspective . . . . . . . . . . . . 2685--2698
                    Tong Ye and   
               Jingjie Ding and   
                Tony T. Lee and   
                    Guido Maier   AWG-Based Nonblocking Shuffle--Exchange
                                  Networks . . . . . . . . . . . . . . . . 2699--2712
                Huazhe Wang and   
                     Xin Li and   
                  Yang Wang and   
                    Yu Zhao and   
                      Ye Yu and   
               Hongkun Yang and   
                      Chen Qian   SICS: Secure and Dynamic Middlebox
                                  Outsourcing  . . . . . . . . . . . . . . 2713--2726
                Juhyeng Han and   
               Seongmin Kim and   
                Daeyang Cho and   
             Byungkwon Choi and   
               Jaehyeong Ha and   
                     Dongsu Han   A Secure Middlebox Framework for
                                  Enabling Visibility Over Multiple
                                  Encryption Protocols . . . . . . . . . . 2727--2740
                    Hui Xia and   
                  Rui Zhang and   
             Xiangguo Cheng and   
                    Tie Qiu and   
               Dapeng Oliver Wu   Two-Stage Game Design of Payoff
                                  Decision-Making Scheme for Crowdsourcing
                                  Dilemmas . . . . . . . . . . . . . . . . 2741--2754
                 Boyuan Yan and   
                Yongli Zhao and   
                Xiaosong Yu and   
                   Yajie Li and   
             Sabidur Rahman and   
                  Yongqi He and   
               Xiangjun Xin and   
                      Jie Zhang   Service Function Path Provisioning With
                                  Topology Aggregation in Multi-Domain
                                  Optical Networks . . . . . . . . . . . . 2755--2767
               Yiming Zhang and   
                Haonan Wang and   
                Menghan Jia and   
                Jinyan Wang and   
               Dongsheng Li and   
               Guangtao Xue and   
                   Kian-Lee Tan   TopoX: Topology Refactorization for
                                  Minimizing Network Communication in
                                  Graph Computations . . . . . . . . . . . 2768--2782
                   Xi Huang and   
                Simeng Bian and   
                  Ziyu Shao and   
                        Hong Xu   Predictive Switch-Controller Association
                                  and Control Devolution for SDN Systems   2783--2796
                   Lei Deng and   
              Haifeng Zheng and   
              Xiao-Yang Liu and   
                Xinxin Feng and   
            Zhizhang David Chen   Network Latency Estimation With Leverage
                                  Sampling for Personal Devices: an
                                  Adaptive Tensor Completion Approach  . . 2797--2808


IEEE\slash ACM Transactions on Networking
Volume 29, Number 1, February, 2021

          Vasileios Giotsas and   
             George Nomikos and   
         Vasileios Kotronis and   
           Pavlos Sermpezis and   
               Petros Gigis and   
        Lefteris Manassakis and   
          Christoph Dietzel and   
       Stavros Konstantaras and   
       Xenofontas Dimitropoulos   O Peer, Where Art Thou? Uncovering
                                  Remote Peering Interconnections at IXPs  1--16
                  Zehua Guo and   
                    Yang Xu and   
                Ya-Feng Liu and   
                    Sen Liu and   
           H. Jonathan Chao and   
               Zhi-Li Zhang and   
                   Yuanqing Xia   AggreFlow: Achieving Power Efficiency,
                                  Load Balancing, and Quality of Service
                                  in Data Center Networks  . . . . . . . . 17--33
                   Lin Wang and   
                   Lei Jiao and   
                    Ting He and   
                     Jun Li and   
                      Henri Bal   Service Placement for Collaborative Edge
                                  Applications . . . . . . . . . . . . . . 34--47
                Haipeng Dai and   
                Yunhuai Liu and   
                     Nan Yu and   
                Chaofeng Wu and   
                Guihai Chen and   
                    Tian He and   
                    Alex X. Liu   Radiation Constrained Wireless Charger
                                  Placement  . . . . . . . . . . . . . . . 48--64
                   Meng Jin and   
                    Yuan He and   
                   Xin Meng and   
                Dingyi Fang and   
                 Xiaojiang Chen   Parallel Backscatter in the Wild: When
                                  Burstiness and Randomness Play With You  65--77
               Xiaoli Zhang and   
                      Qi Li and   
                 Zeyu Zhang and   
                Jianping Wu and   
                    Jiahai Yang   vSFC: Generic and Agile Verification of
                                  Service Function Chains in the Cloud . . 78--91
                Minmei Wang and   
                  Chen Qian and   
                     Xin Li and   
               Shouqian Shi and   
                   Shigang Chen   Collaborative Validation of Public-Key
                                  Certificates for IoT by Distributed
                                  Caching  . . . . . . . . . . . . . . . . 92--105
               Zahra Naghsh and   
                Shahrokh Valaee   Conflict-Free Scheduling in Cellular V2X
                                  Communications . . . . . . . . . . . . . 106--119
               Weng Chon Ao and   
               Po-Han Huang and   
           Konstantinos Psounis   Joint Workload Distribution and Capacity
                                  Augmentation in Hybrid Datacenter
                                  Networks . . . . . . . . . . . . . . . . 120--133
                Shaojun Zou and   
               Jiawei Huang and   
               Jianxin Wang and   
                        Tian He   Flow-Aware Adaptive Pacing to Mitigate
                                  TCP Incast in Data Center Networks . . . 134--147
                 Yunpeng Li and   
     Costas A. Courcoubetis and   
               Lingjie Duan and   
                  Richard Weber   Optimal Pricing for Peer-to-Peer Sharing
                                  With Network Externalities . . . . . . . 148--161
               Chuanwen Luo and   
         Meghana N. Satpute and   
                  Deying Li and   
               Yongcai Wang and   
               Wenping Chen and   
                       Weili Wu   Fine-Grained Trajectory Optimization of
                                  Multiple UAVs for Efficient Data
                                  Gathering from WSNs  . . . . . . . . . . 162--175
                Wenzheng Xu and   
                Weifa Liang and   
                 Zichuan Xu and   
                  Jian Peng and   
               Dezhong Peng and   
                   Tang Liu and   
                Xiaohua Jia and   
                   Sajal K. Das   Approximation Algorithms for the
                                  Generalized Team Orienteering Problem
                                  and its Applications . . . . . . . . . . 176--189
               Zuyuan Zhang and   
              Fangming Shao and   
                  Nan Zhang and   
                     Yifeng Niu   Maximizing $k$-Terminal Network
                                  Reliability in Some Sparse Graphs  . . . 190--202
             Huanhuan Huang and   
                    Tong Ye and   
                Tony T. Lee and   
                   Weiqiang Sun   Delay and Stability Analysis of
                                  Connection-Based Slotted-Aloha . . . . . 203--219
    Konstantinos Psychasand and   
                  Javad Ghaderi   High-Throughput Bin Packing: Scheduling
                                  Jobs With Random Resource Demands in
                                  Clusters . . . . . . . . . . . . . . . . 220--233
          B. R. Vinay Kumar and   
                  Navin Kashyap   Probabilistic Forwarding of Coded
                                  Packets on Networks  . . . . . . . . . . 234--247
               Jianchun Liu and   
                  Hongli Xu and   
              Gongming Zhao and   
                  Chen Qian and   
               Xingpeng Fan and   
                 Xuwei Yang and   
                       He Huang   Incremental Server Deployment for
                                  Software-Defined NFV-Enabled Networks    248--261
        Timmy Schüller and   
           Nils Aschenbruck and   
             Markus Chimani and   
               Martin Horneffer   Failure Resiliency With Only a Few
                                  Tunnels --- Enabling Segment Routing for
                                  Traffic Engineering  . . . . . . . . . . 262--274
          Vitalii Demianiuk and   
            Sergey Gorinsky and   
        Sergey I. Nikolenko and   
                   Kirill Kogan   Robust Distributed Monitoring of Traffic
                                  Flows  . . . . . . . . . . . . . . . . . 275--288
                Chunyu Qiao and   
               Jiliang Wang and   
                     Yunhao Liu   Beyond QoE: Diversity Adaptation in
                                  Video Streaming at the Edge  . . . . . . 289--302
     Luca Maria Castiglione and   
              Paolo Falcone and   
           Alberto Petrillo and   
        Simon Pietro Romano and   
               Stefania Santini   Cooperative Intersection Crossing Over
                                  5G . . . . . . . . . . . . . . . . . . . 303--317
                 Ahsen Ejaz and   
    Vassilis Papaefstathiou and   
                Ioannis Sourdis   HighwayNoC: Approaching Ideal NoC
                                  Performance With Dual Data Rate Routers  318--331
                 Peng Zhang and   
            Fangzheng Zhang and   
                  Shimin Xu and   
                 Zuoru Yang and   
                     Hao Li and   
                      Qi Li and   
              Huanzhao Wang and   
                  Chao Shen and   
                   Chengchen Hu   Network-Wide Forwarding Anomaly
                                  Detection and Localization in Software
                                  Defined Networks . . . . . . . . . . . . 332--345
           Saadallah Kassir and   
     Pablo Caballero Garces and   
         Gustavo de Veciana and   
                Nannan Wang and   
                    Xi Wang and   
             Paparao Palacharla   An Analytical Model and Performance
                                  Evaluation of Multihomed Multilane
                                  VANETs . . . . . . . . . . . . . . . . . 346--359
                 Zhiyuan Xu and   
                 Dejun Yang and   
                  Jian Tang and   
                 Yinan Tang and   
              Tongtong Yuan and   
                Yanzhi Wang and   
                   Guoliang Xue   An Actor--Critic-Based Transfer Learning
                                  Framework for Experience-Driven
                                  Networking . . . . . . . . . . . . . . . 360--371
                 Xinyu Tong and   
                   Yang Wan and   
                  Qianru Li and   
               Xiaohua Tian and   
                   Xinbing Wang   CSI Fingerprinting Localization With Low
                                  Human Efforts  . . . . . . . . . . . . . 372--385
              Jianxiong Guo and   
              Tiantian Chen and   
                       Weili Wu   A Multi-Feature Diffusion Model: Rumor
                                  Blocking in Social Networks  . . . . . . 386--397
               Canh T. Dinh and   
             Nguyen H. Tran and   
          Minh N. H. Nguyen and   
           Choong Seon Hong and   
                    Wei Bao and   
           Albert Y. Zomaya and   
                Vincent Gramoli   Federated Learning Over Wireless
                                  Networks: Convergence Analysis and
                                  Resource Allocation  . . . . . . . . . . 398--409
                Zhichao Cao and   
               Jiliang Wang and   
                  Daibo Liu and   
                   Qiang Ma and   
                   Xin Miao and   
                      Xufei Mao   Chase++: Fountain-Enabled Fast Flooding
                                  in Asynchronous Duty Cycle Networks  . . 410--422

IEEE\slash ACM Transactions on Networking
Volume 29, Number 2, April, 2021

                    Wei Bai and   
                 Shuihai Hu and   
                   Kai Chen and   
                    Kun Tan and   
                Yongqiang Xiong   One More Config is Enough: Saving
                                  (DC)TCP for High-Speed Extremely
                                  Shallow-Buffered Datacenters . . . . . . 489--502
         Sándor Laki and   
   Szilveszter Nádas and   
             Gerg\Ho Gombos and   
               Ferenc Fejes and   
        Péter Hudoba and   
Zoltán Turányi and   
         Zoltán Kiss and   
                   Csaba Keszei   Core-Stateless Forwarding With QoS
                                  Revisited: Decoupling Delay and
                                  Bandwidth Requirements . . . . . . . . . 503--516
              Gal Mendelson and   
             Shay Vargaftik and   
         Katherine Barabash and   
             Dean H. Lorenz and   
             Isaac Keslassy and   
                     Ariel Orda   AnchorHash: a Scalable Consistent Hash   517--528
         Bahman Abolhassani and   
               John Tadrous and   
                Atilla Eryilmaz   Delay Gain Analysis of Wireless
                                  Multicasting for Content Distribution    529--542
                  Fan Cheng and   
               Congtao Wang and   
               Xingyi Zhang and   
                       Yun Yang   A Local-Neighborhood Information Based
                                  Overlapping Community Detection
                                  Algorithm for Large-Scale Complex
                                  Networks . . . . . . . . . . . . . . . . 543--556
                  Wenjie Li and   
       Sharief M. A. Oteafy and   
               Marwan Fayed and   
            Hossam S. Hassanein   Quality of Experience in ICN: Keep Your
                                  Low- Bitrate Close and High-Bitrate
                                  Closer . . . . . . . . . . . . . . . . . 557--570
                 Qiao Xiang and   
                  Haitao Yu and   
               James Aspnes and   
                  Franck Le and   
                  Chin Guok and   
                Linghe Kong and   
                Y. Richard Yang   Optimizing in the Dark: Learning Optimal
                                  Network Resource Reservation Through a
                                  Simple Request Interface . . . . . . . . 571--584
                   Xin Wang and   
                 Yinlong Xu and   
               Richard T. B. Ma   Paid Peering, Settlement-Free Peering,
                                  or Both? . . . . . . . . . . . . . . . . 585--594
               Liekang Zeng and   
                    Xu Chen and   
                   Zhi Zhou and   
                   Lei Yang and   
                  Junshan Zhang   CoEdge: Cooperative DNN Inference With
                                  Adaptive Workload Partitioning Over
                                  Heterogeneous Edge Devices . . . . . . . 595--608
               Itamar Cohen and   
               Gil Einziger and   
               Roy Friedman and   
               Gabriel Scalosub   Access Strategies for Network Caching    609--622
              Menghao Zhang and   
                  Guanyu Li and   
                     Lei Xu and   
                Jiasong Bai and   
                 Mingwei Xu and   
                  Guofei Gu and   
                    Jianping Wu   Control Plane Reflection Attacks and
                                  Defenses in Software-Defined Networks    623--636
               Marco Chiesa and   
               Roshan Sedar and   
             Gianni Antichi and   
        Michael Borokhovich and   
       Andrzej Kamisi\'nski and   
        Georgios Nikolaidis and   
                  Stefan Schmid   Fast ReRoute on Programmable Switches    637--650
            Giuliano Casale and   
                   Nicolas Gast   Performance Analysis Methods for
                                  List-Based Caches With Non-Uniform
                                  Access . . . . . . . . . . . . . . . . . 651--664
                   Jing Hou and   
                     Li Sun and   
                    Tao Shu and   
                  Yong Xiao and   
                   Marwan Krunz   Economics of Strategic Network
                                  Infrastructure Sharing: a Backup
                                  Reservation Approach . . . . . . . . . . 665--680
                  Libin Liu and   
                        Hong Xu   Elasecutor: Elastic Executor Scheduling
                                  in Data Analytics Systems  . . . . . . . 681--694
                     Lin He and   
                   Gang Ren and   
                   Ying Liu and   
                    Jiahai Yang   PAVI: Bootstrapping Accountability and
                                  Privacy to IPv6 Internet . . . . . . . . 695--708
                    Qian Ma and   
                 Edmund Yeh and   
                  Jianwei Huang   Selfish Caching Games on Directed Graphs 709--722
                  Zili Meng and   
                 Yaning Guo and   
                 Yixin Shen and   
                  Jing Chen and   
                  Chao Zhou and   
                 Minhu Wang and   
                  Jia Zhang and   
                 Mingwei Xu and   
                   Chen Sun and   
                     Hongxin Hu   Practically Deploying Heavyweight
                                  Adaptive Bitrate Algorithms With
                                  Teacher-Student Learning . . . . . . . . 723--736
                Gauri Joshi and   
                 Dhruva Kaushal   Synergy via Redundancy: Adaptive
                                  Replication Strategies and Fundamental
                                  Limits . . . . . . . . . . . . . . . . . 737--749
               Jeongmin Bae and   
                Joohyun Lee and   
                     Song Chong   Learning to Schedule Network Resources
                                  Throughput and Delay Optimally Using
                                  Q$^+$-Learning . . . . . . . . . . . . . 750--763
                 Shaoran Li and   
                  Yan Huang and   
              Chengzhang Li and   
           Brian A. Jalaian and   
              Y. Thomas Hou and   
                Wenjing Lou and   
                Stephen Russell   Maximize Spectrum Efficiency in Underlay
                                  Coexistence With Channel Uncertainty . . 764--778
            Vajiheh Farhadi and   
              Fidan Mehmeti and   
                    Ting He and   
         Thomas F. La Porta and   
            Hana Khamfroush and   
              Shiqiang Wang and   
              Kevin S. Chan and   
        Konstantinos Poularakis   Service Placement and Request Scheduling
                                  for Data-Intensive Applications in Edge
                                  Clouds . . . . . . . . . . . . . . . . . 779--792
                 Yong Huang and   
                   Wei Wang and   
                  Tao Jiang and   
                     Qian Zhang   Detecting Colluding Sybil Attackers in
                                  Robotic Networks Using Backscatters  . . 793--804
              Galia Shabtai and   
                  Danny Raz and   
                  Yuval Shavitt   Risk Aware Stochastic Placement of Cloud
                                  Services . . . . . . . . . . . . . . . . 805--820
                Zicheng Chi and   
                     Yan Li and   
                 Hongyu Sun and   
             Zhichuan Huang and   
                       Ting Zhu   Simultaneous Bi-Directional
                                  Communications and Data Forwarding Using
                                  a Single ZigBee Data Stream  . . . . . . 821--833
                  Fujie Fan and   
                Hangyu Meng and   
                    Bing Hu and   
              Kwan L. Yeung and   
                   Zhifeng Zhao   Roulette Wheel Balancing Algorithm With
                                  Dynamic Flowlet Switching for Multipath
                                  Datacenter Networks  . . . . . . . . . . 834--847
          Mohammad Jahanian and   
             K. K. Ramakrishnan   Name Space Analysis: Verification of
                                  Named Data Network Data Planes . . . . . 848--861
                 Che-Hao Yu and   
                  Lin Huang and   
          Cheng-Shang Chang and   
                  Duan-Shin Lee   Poisson Receivers: a Probabilistic
                                  Framework for Analyzing Coded Random
                                  Access . . . . . . . . . . . . . . . . . 862--875
                   Ming Shi and   
                Xiaojun Lin and   
                    Sonia Fahmy   Competitive Online Convex Optimization
                                  With Switching Costs and Ramp
                                  Constraints  . . . . . . . . . . . . . . 876--889
               Xiaofeng Shi and   
                 Haofan Cai and   
                Minmei Wang and   
                    Ge Wang and   
               Baiwen Huang and   
                 Junjie Xie and   
                      Chen Qian   TagAttention: Mobile Object Tracing With
                                  Zero Appearance Knowledge by Vision-RFID
                                  Fusion . . . . . . . . . . . . . . . . . 890--903

IEEE\slash ACM Transactions on Networking
Volume 29, Number 3, June, 2021

              Rukhsana Ruby and   
               Shuxin Zhong and   
        Basem M. ElHalawany and   
               Hanjiang Luo and   
                     Kaishun Wu   SDN-Enabled Energy-Aware Routing in
                                  Underwater Multi-Modal Communication
                                  Networks . . . . . . . . . . . . . . . . 965--978
           Behrooz Farkiani and   
            Bahador Bakhshi and   
          S. Ali MirHassani and   
                Tim Wauters and   
            Bruno Volckaert and   
                 Filip De Turck   Prioritized Deployment of Dynamic
                                  Service Function Chains  . . . . . . . . 979--993
                Dongxiao Yu and   
                  Yifei Zou and   
                 Yong Zhang and   
                  Hao Sheng and   
                 Weifeng Lv and   
                  Xiuzhen Cheng   An Exact Implementation of the Abstract
                                  MAC Layer via Carrier Sensing in Dynamic
                                  Networks . . . . . . . . . . . . . . . . 994--1007
                Jiadong Lou and   
                    Xu Yuan and   
            Sastry Kompella and   
                Nian-Feng Tzeng   Boosting or Hindering: AoI and
                                  Throughput Interrelation in
                                  Routing-Aware Multi-Hop Wireless
                                  Networks . . . . . . . . . . . . . . . . 1008--1021
           Chien-Sheng Yang and   
           Ramtin Pedarsani and   
           A. Salman Avestimehr   Edge Computing in the Dark: Leveraging
                                  Contextual-Combinatorial Bandit and
                                  Coded Computing  . . . . . . . . . . . . 1022--1031
                 Kamran Ali and   
                Alex X. Liu and   
        Ioannis Pefkianakis and   
                    Kyu-Han Kim   Distributed Spectrum Sharing for
                                  Enterprise Powerline Communication
                                  Networks . . . . . . . . . . . . . . . . 1032--1045
             Mengyuan Zhang and   
                   Lei Yang and   
                   Shibo He and   
                    Ming Li and   
                  Junshan Zhang   Privacy-Preserving Data Aggregation for
                                  Mobile Crowdsensing With Externality: an
                                  Auction Approach . . . . . . . . . . . . 1046--1059
                Gourav Saha and   
      Alhussein A. Abouzeid and   
                Zaheer Khan and   
          Marja Matinmikko-Blue   On the Optimal Duration of Spectrum
                                  Leases in Exclusive License Markets With
                                  Stochastic Demand  . . . . . . . . . . . 1060--1073
       Ahmed M. Abdelmoniem and   
                 Brahim Bensaou   T-RACKs: a Faster Recovery Mechanism for
                                  TCP in Data Center Networks  . . . . . . 1074--1087
              Tianming Zhao and   
                Weisheng Si and   
                     Wei Li and   
               Albert Y. Zomaya   Optimizing the Maximum Vertex Coverage
                                  Attacks Under Knapsack Constraint  . . . 1088--1104
   Guilherme Iecker Ricardo and   
           Alina Tuholukova and   
            Giovanni Neglia and   
       Thrasyvoulos Spyropoulos   Caching Policies for Delay Minimization
                                  in Small Cell Networks With Coordinated
                                  Multi-Point Joint Transmissions  . . . . 1105--1115
          \'Ciril Ro\vzi\'c and   
                   Galen Sasaki   Optical Protection Cost of Loop Free
                                  Alternates on Completely Connected IP
                                  Networks Over Optical Rings  . . . . . . 1116--1127
                   Meng Jin and   
                    Yuan He and   
             Chengkun Jiang and   
                     Yunhao Liu   Parallel Backscatter: Channel Estimation
                                  and Beyond . . . . . . . . . . . . . . . 1128--1140
          Vitalii Demianiuk and   
               Kirill Kogan and   
               Sergey Nikolenko   Approximate Packet Classifiers With
                                  Controlled Accuracy  . . . . . . . . . . 1141--1154
               Holger Boche and   
         Rafael F. Schaefer and   
                H. Vincent Poor   On the Algorithmic Solvability of
                                  Channel Dependent Classification
                                  Problems in Communication Systems  . . . 1155--1168
                    Dan Xia and   
             Xiaolong Zheng and   
                  Liang Liu and   
                Chaoyu Wang and   
                     Huadong Ma   \em $c$--Chirp: Towards Symmetric
                                  Cross-Technology Communication Over
                                  Asymmetric Channels  . . . . . . . . . . 1169--1182
               Jiawei Huang and   
                 Wenjun Lyu and   
                   Weihe Li and   
               Jianxin Wang and   
                        Tian He   Mitigating Packet Reordering for Random
                                  Packet Spraying in Data Center Networks  1183--1196
                  Yang Yang and   
               Yanjiao Chen and   
                       Fei Chen   A Compressive Integrity Auditing
                                  Protocol for Secure Cloud Storage  . . . 1197--1209
               K. P. Naveen and   
              Rajesh Sundaresan   Double-Auction Mechanisms for Resource
                                  Trading Markets  . . . . . . . . . . . . 1210--1223
                Rahul Singh and   
                    P. R. Kumar   Adaptive CSMA for Decentralized
                                  Scheduling of Multi-Hop Networks With
                                  End-to-End Deadline Constraints  . . . . 1224--1237
               Gamal Sallam and   
                          Bo Ji   Joint Placement and Allocation of VNF
                                  Nodes With Budget and Capacity
                                  Constraints  . . . . . . . . . . . . . . 1238--1251
                 Zhenlin An and   
                   Lei Yang and   
                 Qiongzheng Lin   Identifying UHF RFIDs in Range of
                                  Readers With WiFi  . . . . . . . . . . . 1252--1265
           Mohammed Alasmar and   
              Richard Clegg and   
        Nickolay Zakhleniuk and   
                 George Parisis   Internet Traffic Volumes are Not
                                  Gaussian --- They are Log-Normal: an
                                  18-Year Longitudinal Study With
                                  Implications for Modelling and
                                  Prediction . . . . . . . . . . . . . . . 1266--1279
               Haisheng Tan and   
                  Chi Zhang and   
                    Chao Xu and   
                  Yupeng Li and   
                Zhenhua Han and   
                  Xiang-Yang Li   Regularization-Based Coflow Scheduling
                                  in Optical Circuit Switches  . . . . . . 1280--1293
              Cho-Chun Chiu and   
                        Ting He   Stealthy DGoS Attack: DeGrading of
                                  Service Under the Watch of Network
                                  Tomography . . . . . . . . . . . . . . . 1294--1307
                   Deke Guo and   
                 Junjie Xie and   
               Xiaofeng Shi and   
                 Haofan Cai and   
                  Chen Qian and   
                   Honghui Chen   HDS: a Fast Hybrid Data Location Service
                                  for Hierarchical Mobile Edge Computing   1308--1320
               Feihong Yang and   
                      Yuan Shen   Critical Intensity for Unbounded
                                  Sequential Localizability  . . . . . . . 1321--1334
              Liangxiao Xin and   
              David Starobinski   Countering Cascading Denial of Service
                                  Attacks on Wi-Fi Networks  . . . . . . . 1335--1348
           Trupil Limbasiya and   
                Debasis Das and   
                   Sajal K. Das   MComIoV: Secure and Energy-Efficient
                                  Message Communication Protocols for
                                  Internet of Vehicles . . . . . . . . . . 1349--1361
          Subhramoy Mohanti and   
               Elif Bozkaya and   
           M. Yousof Naderi and   
               Berk Canberk and   
             Gokhan Secinti and   
           Kaushik R. Chowdhury   WiFED Mobile: WiFi Friendly Energy
                                  Delivery With Mobile Distributed
                                  Beamforming  . . . . . . . . . . . . . . 1362--1375

IEEE\slash ACM Transactions on Networking
Volume 29, Number 4, August, 2021

                 Jinwei Liu and   
               Haiying Shen and   
                Hongmei Chi and   
            Husnu S. Narman and   
                Yongyi Yang and   
                 Long Cheng and   
                  Wingyan Chung   A Low-Cost Multi-Failure Resilient
                                  Replication Scheme for High-Data
                                  Availability in Cloud Storage  . . . . . 1436--1451
                     Yan Gu and   
                     Bo Liu and   
                   Xiaojun Shen   Asymptotically Optimal Online Scheduling
                                  With Arbitrary Hard Deadlines in
                                  Multi-Hop Communication Networks . . . . 1452--1466
          Amir Behrouzi-Far and   
                 Emina Soljanin   Efficient Replication for Fast and
                                  Predictable Performance in Distributed
                                  Computing  . . . . . . . . . . . . . . . 1467--1476
               Jiancheng Ye and   
            Ka-Cheong Leung and   
                  Steven H. Low   Combating Bufferbloat in
                                  Multi-Bottleneck Networks: Theory and
                                  Algorithms . . . . . . . . . . . . . . . 1477--1493
              Sneihil Gopal and   
             Sanjit K. Kaul and   
          Rakesh Chaturvedi and   
                      Sumit Roy   Coexistence of Age and Throughput
                                  Optimizing Networks: a Spectrum Sharing
                                  Game . . . . . . . . . . . . . . . . . . 1494--1508
                  Guanyu Li and   
              Menghao Zhang and   
              Shicheng Wang and   
                  Chang Liu and   
                 Mingwei Xu and   
                   Ang Chen and   
                 Hongxin Hu and   
                  Guofei Gu and   
                      Qi Li and   
                    Jianping Wu   Enabling Performant, Flexible and
                                  Cost-Efficient DDoS Defense With
                                  Programmable Switches  . . . . . . . . . 1509--1526
                 Guanhao Wu and   
               Xiaofeng Gao and   
                Jiaqi Zheng and   
                    Guihai Chen   Achieving Fast Loop-Free Updates With
                                  Ingress Port in Software-Defined
                                  Networks . . . . . . . . . . . . . . . . 1527--1539
               Miguel Neves and   
           Bradley Huffaker and   
           Kirill Levchenko and   
              Marinho Barcellos   Dynamic Property Enforcement in
                                  Programmable Data Planes . . . . . . . . 1540--1552
                  Huanle Xu and   
                   Yang Liu and   
                Wing Cheong Lau   Optimal Job Scheduling With Resource
                                  Packing for Heterogeneous Servers  . . . 1553--1566
                    Yuan He and   
                Xiuzhen Guo and   
                  Jia Zhang and   
                  Haotian Jiang   WIDE: Physical-Level CTC via Digital
                                  Emulation  . . . . . . . . . . . . . . . 1567--1579
                Ziyao Zhang and   
                   Liang Ma and   
               Kin K. Leung and   
                      Franck Le   More Is Not Always Better: an Analytical
                                  Study of Controller Synchronizations in
                                  Distributed SDN  . . . . . . . . . . . . 1580--1590
               Tingjun Chen and   
  Mahmood Baraani Dastjerdi and   
        Harish Krishnaswamy and   
                    Gil Zussman   Wideband Full-Duplex Phased Array With
                                  Joint Transmit and Receive Beamforming:
                                  Optimization and Rate Gains  . . . . . . 1591--1604
                   Zhe Chen and   
                   Xu Zhang and   
                 Sulei Wang and   
                 Yuedong Xu and   
                  Jie Xiong and   
                       Xin Wang   Enabling Practical Large-Scale MIMO in
                                  WLANs With Hybrid Beamforming  . . . . . 1605--1619
          Cheng-Shang Chang and   
             Jang-Ping Sheu and   
                   Yi-Jheng Lin   On the Theoretical Gap of Channel
                                  Hopping Sequences With Maximum
                                  Rendezvous Diversity in the Multichannel
                                  Rendezvous Problem . . . . . . . . . . . 1620--1633
     Bijoy Chand Chatterjee and   
                Abdul Wadud and   
                Imran Ahmed and   
                       Eiji Oki   Priority-Based Inter-Core and Inter-Mode
                                  Crosstalk-Avoided Resource Allocation
                                  for Spectrally-Spatially Elastic Optical
                                  Networks . . . . . . . . . . . . . . . . 1634--1647
         Balázs Vass and   
      János Tapolcai and   
Erika R. Bérczi-Kovács   Enumerating Maximal Shared Risk Link
                                  Groups of Circular Disk Failures Hitting
                                  $k$ Nodes  . . . . . . . . . . . . . . . 1648--1661
                  Yifei Zou and   
                Dongxiao Yu and   
                   Jiguo Yu and   
                 Yong Zhang and   
             Falko Dressler and   
                  Xiuzhen Cheng   Distributed Byzantine-Resilient
                                  Multiple-Message Dissemination in
                                  Wireless Networks  . . . . . . . . . . . 1662--1675
                Yuhui Zhang and   
                     Dejun Yang   RobustPay$^+$: Robust Payment Routing
                                  With Approximation Guarantee in
                                  Blockchain-Based Payment Channel
                                  Networks . . . . . . . . . . . . . . . . 1676--1686
                    Ning Li and   
              Zhaoxin Zhang and   
                Alex X. Liu and   
                   Xin Yuan and   
                    Yexia Cheng   Pairwise-Based Multi-Attribute Decision
                                  Making Approach for Wireless Network . . 1687--1702
        Christos Tsanikidis and   
                  Javad Ghaderi   On the Power of Randomization for
                                  Scheduling Real-Time Traffic in Wireless
                                  Networks . . . . . . . . . . . . . . . . 1703--1716
                    Si Chen and   
               Maolin Zhang and   
                   Jia Zhao and   
                   Wei Gong and   
                 Jiangchuan Liu   Reliable and Practical Bluetooth
                                  Backscatter With Commodity Devices . . . 1717--1729
            Gayane Vardoyan and   
               C. V. Hollot and   
                    Don Towsley   Towards Stability Analysis of Data
                                  Transport Mechanisms: a Fluid Model and
                                  Its Applications . . . . . . . . . . . . 1730--1744
                    Qian Ma and   
              Jianwei Huang and   
              Tamer Ba\csar and   
                     Ji Liu and   
                    Xudong Chen   Reputation and Pricing Dynamics in
                                  Online Markets . . . . . . . . . . . . . 1745--1759
               Jianan Zhang and   
             Abhishek Sinha and   
               Jaime Llorca and   
          Antonia M. Tulino and   
                  Eytan Modiano   Optimal Control of Distributed Computing
                                  Networks With Mixed-Cast Traffic Flows   1760--1773
     Himaja Kesavareddigari and   
                Atilla Eryilmaz   Counter-Intuitive Characteristics of
                                  Rational Decision-Making Using Biased
                                  Inputs in Information Networks . . . . . 1774--1785
             Raimund Kirner and   
                 Peter Puschner   A Quantitative Analysis of Interfaces to
                                  Time-Triggered Communication Buses . . . 1786--1797
                   Qiang Li and   
                Zhihao Wang and   
                  Dawei Tan and   
                 Jinke Song and   
               Haining Wang and   
                  Limin Sun and   
                    Jiqiang Liu   GeoCAM: an IP-Based Geolocation Service
                                  Through Fine-Grained and Stable Webcam
                                  Landmarks  . . . . . . . . . . . . . . . 1798--1812
                  Ming Tang and   
                  Jianwei Huang   How Do You Earn Money on Live Streaming
                                  Platforms? --- A Study of Donation-Based
                                  Markets  . . . . . . . . . . . . . . . . 1813--1826
                   Ning Xie and   
                 Haijun Tan and   
                  Lei Huang and   
                    Alex X. Liu   Physical-Layer Authentication in
                                  Wirelessly Powered Communication
                                  Networks . . . . . . . . . . . . . . . . 1827--1840
               Haisheng Tan and   
       Shaofeng H.-C. Jiang and   
                Zhenhua Han and   
                     Mingxia Li   Asymptotically Optimal Online Caching on
                                  Multiple Caches With Relaying and
                                  Bypassing  . . . . . . . . . . . . . . . 1841--1852

IEEE\slash ACM Transactions on Networking
Volume 29, Number 5, October, 2021

                  Huy Duong and   
           Brigitte Jaumard and   
              David Coudert and   
         Romualdas Armolavicius   Efficient Make-Before-Break Layer 2
                                  Reoptimization . . . . . . . . . . . . . 1910--1921
                 Dianqi Han and   
                     Ang Li and   
                 Lili Zhang and   
                  Yan Zhang and   
                  Jiawei Li and   
                     Tao Li and   
                   Ting Zhu and   
                  Yanchao Zhang   Deep Learning-Guided Jamming for
                                  Cross-Technology Wireless Networks:
                                  Attack and Defense . . . . . . . . . . . 1922--1932
                Isfar Tariq and   
                  Rajat Sen and   
              Thomas Novlan and   
                Salam Akoum and   
            Milap Majmundar and   
         Gustavo de Veciana and   
              Sanjay Shakkottai   Auto-Tuning for Cellular Scheduling
                                  Through Bandit-Learning and
                                  Low-Dimensional Clustering . . . . . . . 1933--1947
                Gourav Saha and   
          Alhussein A. Abouzeid   Optimal Spectrum Partitioning and
                                  Licensing in Tiered Access Under
                                  Stochastic Market Models . . . . . . . . 1948--1961
        Tasmeen Zaman Ornee and   
                        Yin Sun   Sampling and Remote Estimation for the
                                  Ornstein--Uhlenbeck Process Through
                                  Queues: Age of Information and Beyond    1962--1975
                   Tian Pan and   
               Xingchen Lin and   
                  Enge Song and   
                   Cheng Xu and   
                 Jiao Zhang and   
                     Hao Li and   
                 Jianhui Lv and   
                  Tao Huang and   
                    Bin Liu and   
                 Beichuan Zhang   NB-Cache: Non-Blocking In-Network
                                  Caching for High-Performance Content
                                  Routers  . . . . . . . . . . . . . . . . 1976--1989
                    Wei Sun and   
                  Lisong Xu and   
           Sebastian Elbaum and   
                        Di Zhao   Model-Agnostic and Efficient Exploration
                                  of Numerical Congestion Control State
                                  Space of Real-World TCP Implementations  1990--2004
                  Dai Zhang and   
                    Yu Zhou and   
                 Zhaowei Xi and   
              Yangyang Wang and   
                 Mingwei Xu and   
                    Jianping Wu   HyperTester: High-Performance Network
                                  Testing Driven by Programmable Switches  2005--2018
                    Su Wang and   
                Yichen Ruan and   
                   Yuwei Tu and   
            Satyavrat Wagle and   
     Christopher G. Brinton and   
                Carlee Joe-Wong   Network-Aware Optimization of
                                  Distributed Learning for Fog Computing   2019--2032
                I-Chieh Lin and   
               Yu-Hsuan Yeh and   
              Kate Ching-Ju Lin   Toward Optimal Partial Parallelization
                                  for Service Function Chaining  . . . . . 2033--2044
                    Zai Shi and   
                Atilla Eryilmaz   A Flexible Distributed Stochastic
                                  Optimization Framework for Concurrent
                                  Tasks in Processing Networks . . . . . . 2045--2058
                 Xuwei Yang and   
                  Hongli Xu and   
               Shigang Chen and   
                       He Huang   Indirect Multi-Mapping for Burstiness
                                  Management in Software Defined Networks  2059--2072
                   He Huang and   
                   Yu-E Sun and   
                  Chaoyi Ma and   
               Shigang Chen and   
                    Yang Du and   
                 Haibo Wang and   
                   Qingjun Xiao   Spread Estimation With Non-Duplicate
                                  Sampling in High-Speed Networks  . . . . 2073--2086
         Kashyap Thimmaraju and   
               Liron Schiff and   
                  Stefan Schmid   Preacher: Network Policy Checker for
                                  Adversarial Environments . . . . . . . . 2087--2100
Sergio Barrachina-Muñoz and   
             Boris Bellalta and   
             Edward W. Knightly   Wi-Fi Channel Bonding: an All-Channel
                                  System and Experimental Study From Urban
                                  Hotspots to a Sold-Out Stadium . . . . . 2101--2114
                Qixia Zhang and   
               Fangming Liu and   
                  Chaobing Zeng   Online Adaptive Interference-Aware VNF
                                  Deployment and Migration for 5G Network
                                  Slice  . . . . . . . . . . . . . . . . . 2115--2128
            Ahmed M. Bedewy and   
                    Yin Sun and   
                Rahul Singh and   
                 Ness B. Shroff   Low-Power Status Updates via Sleep-Wake
                                  Scheduling . . . . . . . . . . . . . . . 2129--2141
                Dongxiao Yu and   
                  Yifei Zou and   
                   Jiguo Yu and   
                      Yu Wu and   
                 Weifeng Lv and   
              Xiuzhen Cheng and   
             Falko Dressler and   
              Francis C. M. Lau   Distributed Broadcasting in Dynamic
                                  Networks . . . . . . . . . . . . . . . . 2142--2155
                 Wenbin Liu and   
              Yongjian Yang and   
                    En Wang and   
               Hengzhi Wang and   
                  Zihe Wang and   
                         Jie Wu   Dynamic Online User Recruitment With
                                  (Non-) Submodular Utility in Mobile
                                  CrowdSensing . . . . . . . . . . . . . . 2156--2169
                 Hongzi Zhu and   
               Yuxiao Zhang and   
                  Zifan Liu and   
                  Xiao Wang and   
                 Shan Chang and   
                  Yingying Chen   Localizing Acoustic Objects on a Single
                                  Phone  . . . . . . . . . . . . . . . . . 2170--2183
                  Yuhang Ye and   
                  Brian Lee and   
                Ronan Flynn and   
                     Jin Xu and   
               Guiming Fang and   
                  Yuansong Qiao   Delay-Based Network Utility Maximization
                                  Modelling for Congestion Control in
                                  Named Data Networking  . . . . . . . . . 2184--2197
      Anastasios Giovanidis and   
               Bruno Baynat and   
    Clémence Magnien and   
             Antoine Vendeville   Ranking Online Social Users by Their
                                  Influence  . . . . . . . . . . . . . . . 2198--2214
                Ouri Poupko and   
                 Gal Shahaf and   
               Ehud Shapiro and   
                  Nimrod Talmon   Building a Sybil-Resilient Digital
                                  Community Utilizing Trust-Graph
                                  Connectivity . . . . . . . . . . . . . . 2215--2227
               Hongbo Jiang and   
              Mengyuan Wang and   
                  Ping Zhao and   
                   Zhu Xiao and   
               Schahram Dustdar   A Utility-Aware General Framework With
                                  Quantifiable Privacy Preservation for
                                  Destination Prediction in LBSs . . . . . 2228--2241
              Jianghong Wei and   
              Xiaofeng Chen and   
                Jianfeng Ma and   
                 Xuexian Hu and   
                        Kui Ren   Communication-Efficient and Fine-Grained
                                  Forward-Secure Asynchronous Messaging    2242--2253
                  Tianqi Yu and   
               Xianbin Wang and   
                    Jianling Hu   A Fast Hierarchical Physical Topology
                                  Update Scheme for Edge-Cloud
                                  Collaborative IoT Systems  . . . . . . . 2254--2266
                Zhenhua Han and   
               Haisheng Tan and   
       Shaofeng H.-C. Jiang and   
                  Wanli Cao and   
                Xiaoming Fu and   
                  Lan Zhang and   
              Francis C. M. Lau   SPIN: BSP Job Scheduling With
                                  Placement-Sensitive Execution  . . . . . 2267--2280
        Federico Chiariotti and   
             Andrea Zanella and   
              Stepan Kucera and   
               Kariem Fahmi and   
                Holger Claussen   The HOP Protocol: Reliable
                                  Latency-Bounded End-to-End Multipath
                                  Communication  . . . . . . . . . . . . . 2281--2295
                   Luoyi Fu and   
                Jiasheng Xu and   
                    Shan Qu and   
                 Zhiying Xu and   
               Xinbing Wang and   
                    Guihai Chen   Seeking the Truth in a Decentralized
                                  Manner . . . . . . . . . . . . . . . . . 2296--2312
                    Xin Yao and   
                  Rui Zhang and   
             Dingquan Huang and   
                  Yanchao Zhang   Verifiable Query Processing Over
                                  Outsourced Social Graph  . . . . . . . . 2313--2326

IEEE\slash ACM Transactions on Networking
Volume 29, Number 6, December, 2021

              Ran Ben-Basat and   
               Gil Einziger and   
        Shir Landau Feibish and   
              Jalil Moraney and   
                 Bilal Tayh and   
                      Danny Raz   Routing-Oblivious Network-Wide
                                  Measurements . . . . . . . . . . . . . . 2386--2398
        Víctor Valls and   
           George Iosifidis and   
             Leandros Tassiulas   Birkhoff's Decomposition Revisited:
                                  Sparse Scheduling for High-Speed Circuit
                                  Switches . . . . . . . . . . . . . . . . 2399--2412
                Ajay Badita and   
              Parimal Parag and   
                Vaneet Aggarwal   Single-Forking of Coded Subtasks for
                                  Straggler Mitigation . . . . . . . . . . 2413--2424
             Melih Bastopcu and   
                  Sennur Ulukus   Age of Information for Updates With
                                  Distortion: Constant and Age-Dependent
                                  Distortion Constraints . . . . . . . . . 2425--2438
          Mohammad Jahanian and   
               Jiachen Chen and   
             K. K. Ramakrishnan   Graph-Based Namespaces and Load Sharing
                                  for Efficient Information Dissemination  2439--2452
                 Van Sy Mai and   
              Richard J. La and   
                 Abdella Battou   Optimal Cybersecurity Investments in
                                  Large Networks Using SIS Model:
                                  Algorithm Design . . . . . . . . . . . . 2453--2466
             Mahdieh Ahmadi and   
        Morteza Golkarifard and   
               Ali Movaghar and   
                  Hamed Yousefi   Processor Sharing Queues With Impatient
                                  Customers and State-Dependent Rates  . . 2467--2477
                    Chi Lin and   
                 Ziwei Yang and   
                Haipeng Dai and   
              Liangxian Cui and   
                   Lei Wang and   
                      Guowei Wu   Minimizing Charging Delay for
                                  Directional Charging . . . . . . . . . . 2478--2493
                    Zun Yan and   
                 Peng Cheng and   
                  Zhuo Chen and   
             Branka Vucetic and   
                     Yonghui Li   Two-Dimensional Task Offloading for
                                  Mobile Networks: an Imitation Learning
                                  Framework  . . . . . . . . . . . . . . . 2494--2507
                     Kan Yu and   
                   Jiguo Yu and   
              Xiuzhen Cheng and   
                Dongxiao Yu and   
                    Anming Dong   Efficient Link Scheduling Solutions for
                                  the Internet of Things Under Rayleigh
                                  Fading . . . . . . . . . . . . . . . . . 2508--2521
            Beatriz Lorenzo and   
Francisco Javier González-Castaño and   
                  Linke Guo and   
Felipe Gil-Castiñeira and   
                   Yuguang Fang   Autonomous Robustness Control for Fog
                                  Reinforcement in Dynamic Wireless
                                  Networks . . . . . . . . . . . . . . . . 2522--2535
            Giovanni Neglia and   
            Emilio Leonardi and   
   Guilherme Iecker Ricardo and   
       Thrasyvoulos Spyropoulos   A Swiss Army Knife for Online Caching in
                                  Small Cell Networks  . . . . . . . . . . 2536--2547
       Vamseedhar Reddyvari and   
      Sarat Chandra Bobbili and   
              Parimal Parag and   
            Srinivas Shakkottai   Mode-Suppression: a Simple, Stable and
                                  Scalable Chunk-Sharing Algorithm for P2P
                                  Networks . . . . . . . . . . . . . . . . 2548--2559
               Tom Barbette and   
              Cyril Soldani and   
                  Laurent Mathy   Combined Stateful Classification and
                                  Session Splicing for High-Speed NFV
                                  Service Chaining . . . . . . . . . . . . 2560--2573
       Panagiotis Promponas and   
           Christos Pelekis and   
   Eirini Eleni Tsiropoulou and   
           Symeon Papavassiliou   Games in Normal and Satisfaction Form
                                  for Efficient Transmission Power
                                  Allocation Under Dual 5G Wireless
                                  Multiple Access Paradigm . . . . . . . . 2574--2587
           Ravi Kiran Raman and   
                Lav R. Varshney   Coding for Scalable Blockchains via
                                  Dynamic Distributed Storage  . . . . . . 2588--2601
                Xuying Meng and   
                Yequan Wang and   
                Suhang Wang and   
                     Di Yao and   
                    Yujun Zhang   Interactive Anomaly Detection in Dynamic
                                  Communication Networks . . . . . . . . . 2602--2615
               Deliang Yang and   
                 Xuan Huang and   
                  Jun Huang and   
             Xiangmao Chang and   
              Guoliang Xing and   
                      Yang Yang   A First Look at Energy Consumption of
                                  NB-IoT in the Wild: Tools and
                                  Large-Scale Measurement  . . . . . . . . 2616--2631
                Xianjin Xia and   
             Yuanqing Zheng and   
                         Tao Gu   LiteNap: Downclocking LoRa Reception . . 2632--2645
                Shrayan Das and   
         Kirtan Gopal Panda and   
               Debarati Sen and   
                     Wasim Arif   Maximizing Last-Minute Backup in
                                  Endangered Time-Varying Inter-Datacenter
                                  Networks . . . . . . . . . . . . . . . . 2646--2663
               Xingpeng Fan and   
                  Hongli Xu and   
                   He Huang and   
                     Xuwei Yang   Real-Time Update of Joint SFC and
                                  Routing in Software Defined Networks . . 2664--2677
                    Tong Li and   
                  Kai Zheng and   
                      Ke Xu and   
        Rahul Arvind Jadhav and   
                  Tao Xiong and   
             Keith Winstein and   
                        Kun Tan   Revisiting Acknowledgment Mechanism for
                                  Transport Control: Modeling, Analysis,
                                  and Implementation . . . . . . . . . . . 2678--2692
                   Ying Wan and   
                 Haoyu Song and   
                    Yang Xu and   
                 Yilun Wang and   
                   Tian Pan and   
               Chuwen Zhang and   
                    Yi Wang and   
                        Bin Liu   T-Cache: Efficient Policy-Based
                                  Forwarding Using Small TCAM  . . . . . . 2693--2708
          Vignesh Sivaraman and   
                  Biplab Sikdar   A Defense Mechanism Against Timing
                                  Attacks on User Privacy in ICN . . . . . 2709--2722
           Mohammed Alasmar and   
             George Parisis and   
                  Jon Crowcroft   SCDP: Systematic Rateless Coding for
                                  Efficient Data Transport in Data Centers 2723--2736
              Jiazheng Tian and   
                    Kun Xie and   
                   Xin Wang and   
                Gaogang Xie and   
                   Kenli Li and   
                 Jigang Wen and   
               Dafang Zhang and   
                   Jiannong Cao   Efficiently Inferring Top-$k$ Largest
                                  Monitoring Data Entries Based on
                                  Discrete Tensor Completion . . . . . . . 2737--2750
                Yuanyuan Li and   
              Stratis Ioannidis   Cache Networks of Counting Queues  . . . 2751--2764
                Xinyi Zhang and   
                Gaogang Xie and   
                   Xin Wang and   
              Penghao Zhang and   
                 Yanbiao Li and   
         Kavé Salamatian   Fast Online Packet Classification With
                                  Convolutional Neural Network . . . . . . 2765--2778
                    Tao Hou and   
                   Tao Wang and   
                    Zhuo Lu and   
                        Yao Liu   Combating Adversarial Network Topology
                                  Inference by Proactive Topology
                                  Obfuscation  . . . . . . . . . . . . . . 2779--2792
                  Mingli Yu and   
                   Tian Xie and   
                    Ting He and   
           Patrick McDaniel and   
                 Quinn K. Burke   Flow Table Security in SDN: Adversarial
                                  Reconnaissance and Intelligent Attacks   2793--2806


IEEE\slash ACM Transactions on Networking
Volume 30, Number 1, February, 2022

              Kuan-Yin Chen and   
                    Sen Liu and   
                    Yang Xu and   
      Ishant Kumar Siddhrau and   
                  Siyu Zhou and   
                  Zehua Guo and   
               H. Jonathan Chao   SDNShield: NFV-Based Defense Framework
                                  Against DDoS Attacks on SDN Control
                                  Plane  . . . . . . . . . . . . . . . . . 1--17
               Archana Bura and   
           Desik Rengarajan and   
            Dileep Kalathil and   
        Srinivas Shakkottai and   
      Jean-Francois Chamberland   Learning to Cache and Caching to Learn:
                                  Regret Analysis of Caching Algorithms    18--31
     Rajarshi Bhattacharyya and   
               Archana Bura and   
           Desik Rengarajan and   
               Mason Rumuly and   
                 Bainan Xia and   
        Srinivas Shakkottai and   
            Dileep Kalathil and   
            Ricky K. P. Mok and   
                Amogh Dhamdhere   QFlow: a Learning Approach to High QoE
                                  Video Streaming at the Wireless Edge . . 32--46
                    Yi Ding and   
                   Ling Liu and   
                    Yu Yang and   
                Yunhuai Liu and   
              Desheng Zhang and   
                        Tian He   From Conception to Retirement: a
                                  Lifetime Story of a 3-Year-Old Wireless
                                  Beacon System in the Wild  . . . . . . . 47--61
     Vahid Khalilpour Akram and   
           Orhan Dagdeviren and   
                   Bulent Tavli   A Coverage-Aware Distributed
                                  $k$-Connectivity Maintenance Algorithm
                                  for Arbitrarily Large $k$ in Mobile
                                  Sensor Networks  . . . . . . . . . . . . 62--75
                 Jeman Park and   
               Rhongho Jang and   
             Manar Mohaisen and   
                 David Mohaisen   A Large-Scale Behavioral Analysis of the
                                  Open DNS Resolvers on the Internet . . . 76--89
                  Xilai Liu and   
                     Yan Xu and   
                   Peng Liu and   
                  Tong Yang and   
                   Jiaqi Xu and   
                   Lun Wang and   
                Gaogang Xie and   
                Xiaoming Li and   
                    Steve Uhlig   SEAD Counter: Self-Adaptive Counters
                                  With Different Counting Ranges . . . . . 90--106
         Arani Bhattacharya and   
                Caitao Zhan and   
              Abhishek Maji and   
             Himanshu Gupta and   
               Samir R. Das and   
              Petar M. Djuri\'c   Selection of Sensors for Efficient
                                  Transmitter Localization . . . . . . . . 107--119
               Bangbang Ren and   
                   Deke Guo and   
                  Yali Yuan and   
               Guoming Tang and   
                Weijun Wang and   
                    Xiaoming Fu   Optimal Deployment of SRv6 to Enable
                                  Network Interconnection Service  . . . . 120--133
                   Yu Zhang and   
                     Tao Gu and   
                       Xi Zhang   MDLdroid: a ChainSGD-Reduce Approach to
                                  Mobile Deep Learning for Personal Mobile
                                  Sensing  . . . . . . . . . . . . . . . . 134--147
     Amirhossein Reisizadeh and   
             Saurav Prakash and   
           Ramtin Pedarsani and   
         Amir Salman Avestimehr   CodedReduce: a Fast and Robust Framework
                                  for Gradient Aggregation in Distributed
                                  Learning . . . . . . . . . . . . . . . . 148--161
      Umut Can Çabuk and   
              Mustafa Tosun and   
               Orhan Dagdeviren   MAX-Tree: a Novel Topology Formation for
                                  Maximal Area Coverage in Wireless Ad-Hoc
                                  Networks . . . . . . . . . . . . . . . . 162--175
                 Zhiguo Shi and   
                 Guang Yang and   
               Xiaowen Gong and   
                   Shibo He and   
                    Jiming Chen   Quality-Aware Incentive Mechanisms Under
                                  Social Influences in Data Crowdsourcing  176--189
                    Xin Liu and   
                       Lei Ying   Universal Scaling of Distributed Queues
                                  Under Load Balancing in the
                                  Super-Halfin--Whitt Regime . . . . . . . 190--201
              Muhammad Saad and   
                Victor Cook and   
                 Lan Nguyen and   
                 My T. Thai and   
                 David Mohaisen   Exploring Partitioning Attacks on the
                                  Bitcoin Network  . . . . . . . . . . . . 202--214
               Xiaoxi Zhang and   
                Jianyu Wang and   
                Li-Feng Lee and   
                   Tom Yang and   
              Akansha Kalra and   
                Gauri Joshi and   
                Carlee Joe-Wong   Machine Learning on Volatile Instances:
                                  Convergence, Runtime, and Cost Tradeoffs 215--228
              Cho-Hsin Tsai and   
                 Chih-Chun Wang   Unifying AoI Minimization and Remote
                                  Estimation --- Optimal Sensor/Controller
                                  Coordination With Random Two-Way Delay   229--242
                      Xu Li and   
               Feilong Tang and   
                 Yanmin Zhu and   
                   Luoyi Fu and   
                   Jiadi Yu and   
                  Long Chen and   
                   Jiacheng Liu   Processing-While-Transmitting:
                                  Cost-Minimized Transmission in SDN-Based
                                  STINs  . . . . . . . . . . . . . . . . . 243--256
                   Chong Li and   
                    Sisu Xi and   
                Chenyang Lu and   
         Roch Guérin and   
            Christopher D. Gill   Virtualization-Aware Traffic Control for
                                  Soft Real-Time Network Traffic on Xen    257--270
                 Yuchong Hu and   
             Xiaoyang Zhang and   
          Patrick P. C. Lee and   
                       Pan Zhou   NCScale: Toward Optimal Storage Scaling
                                  via Network Coding . . . . . . . . . . . 271--284
                Sheng Zhang and   
                   Can Wang and   
                   Yibo Jin and   
                     Jie Wu and   
              Zhuzhong Qian and   
               Mingjun Xiao and   
                      Sanglu Lu   Adaptive Configuration Selection and
                                  Bandwidth Allocation for Edge-Based
                                  Video Analytics  . . . . . . . . . . . . 285--298
                  Chaoyi Ma and   
               Shigang Chen and   
               Youlin Zhang and   
               Qingjun Xiao and   
            Olufemi O. Odegbile   Super Spreader Identification Using
                                  Geometric-Min Filter . . . . . . . . . . 299--312
                 Junjie Xie and   
                  Chen Qian and   
                   Deke Guo and   
                Minmei Wang and   
                    Ge Wang and   
                   Honghui Chen   COIN: an Efficient Indexing Mechanism
                                  for Unstructured Data Sharing Systems    313--326
                Xiaoyi Pang and   
                 Zhibo Wang and   
                 Defang Liu and   
             John C. S. Lui and   
                  Qian Wang and   
                         Ju Ren   Towards Personalized Privacy-Preserving
                                  Truth Discovery Over Crowdsourced Data
                                  Streams  . . . . . . . . . . . . . . . . 327--340
              Tim Hellemans and   
                Benny Van Houdt   Improved Load Balancing in Large Scale
                                  Systems Using Attained Service Time
                                  Reporting  . . . . . . . . . . . . . . . 341--353
               Tom Barbette and   
                   Erfan Wu and   
             Dejan Kosti\'c and   
          Gerald Q. Maguire and   
  Panagiotis Papadimitratos and   
                   Marco Chiesa   Cheetah: a High-Speed Programmable
                                  Load-Balancer Framework With Guaranteed
                                  Per-Connection-Consistency . . . . . . . 354--367
                  Ning Chen and   
                    Tie Qiu and   
                  Zilong Lu and   
               Dapeng Oliver Wu   An Adaptive Robustness Evolution
                                  Algorithm With Self-Competition and its
                                  $3$D Deployment for Internet of Things   368--381
               Reuven Cohen and   
               Matty Kadosh and   
                    Alan Lo and   
                    Qasem Sayah   LB Scalability: Achieving the Right
                                  Balance Between Being Stateful and
                                  Stateless  . . . . . . . . . . . . . . . 382--393
                  Xiaobo Ma and   
                    Jian Qu and   
                Jianfeng Li and   
             John C. S. Lui and   
                 Zhenhua Li and   
                 Wenmao Liu and   
                  Xiaohong Guan   Inferring Hidden IoT Devices and User
                                  Interactions via Spatial-Temporal
                                  Traffic Fingerprinting . . . . . . . . . 394--408
                Xuewei Feng and   
                      Qi Li and   
                    Kun Sun and   
                 Chuanpu Fu and   
                          Ke Xu   Off-Path TCP Hijacking Attacks via the
                                  Side Channel of Downgraded IPID  . . . . 409--422

IEEE\slash ACM Transactions on Networking
Volume 30, Number 2, April, 2022

            Giovanni Neglia and   
            Michele Garetto and   
                Emilio Leonardi   Similarity Caching: Theory and
                                  Algorithms . . . . . . . . . . . . . . . 475--486
               Jianhan Song and   
         Gustavo de Veciana and   
              Sanjay Shakkottai   Meta-Scheduling for the Wireless
                                  Downlink Through Learning With Bandit
                                  Feedback . . . . . . . . . . . . . . . . 487--500
               Cuiying Feng and   
                 Jianwei An and   
                     Kui Wu and   
                  Jianping Wang   Bound Inference and Reinforcement
                                  Learning-Based Path Construction in
                                  Bandwidth Tomography . . . . . . . . . . 501--514
                  Dapeng Qu and   
                  Guoxin Lv and   
                  Shijun Qu and   
               Haiying Shen and   
                   Yue Yang and   
                  Zhaoyang Heng   An Effective and Lightweight
                                  Countermeasure Scheme to Multiple
                                  Network Attacks in NDN . . . . . . . . . 515--528
                    Zhuo Li and   
                Jindian Liu and   
                    Liu Yan and   
             Beichuan Zhang and   
                   Peng Luo and   
                     Kaihua Liu   Smart Name Lookup for NDN Forwarding
                                  Plane via Neural Networks  . . . . . . . 529--541
                 Shuihai Hu and   
              Gaoxiong Zeng and   
                    Wei Bai and   
                Zilong Wang and   
               Baochen Qiao and   
                   Kai Chen and   
                    Kun Tan and   
                        Yi Wang   Aeolus: a Building Block for Proactive
                                  Transport in Datacenter Networks . . . . 542--556
                     Yu Sun and   
                    Chi Lin and   
                Haipeng Dai and   
               Pengfei Wang and   
                   Lei Wang and   
                  Guowei Wu and   
                    Qiang Zhang   Trading off Charging and Sensing for
                                  Stochastic Events Monitoring in WRSNs    557--571
                 Shuai Wang and   
                Jinkun Geng and   
                         Dan Li   Impact of Synchronization Topology on
                                  DML Performance: Both Logical Topology
                                  and Physical Topology  . . . . . . . . . 572--585
                Yuanpeng Li and   
                   Xiang Yu and   
                Yilong Yang and   
                  Yang Zhou and   
                  Tong Yang and   
                    Zhuo Ma and   
                   Shigang Chen   Pyramid Family: Generic Frameworks for
                                  Accurate and Fast Flow Size Measurement  586--600
                  Yan Huang and   
                 Shaoran Li and   
              Y. Thomas Hou and   
                    Wenjing Lou   GPF+_: a Novel Ultrafast GPU-Based
                                  Proportional Fair Scheduler for 5G NReee 601--615
           Leonardo Lanante and   
                      Sumit Roy   Performance Analysis of the IEEE
                                  802.11ax OBSS\_PD-Based Spatial Reuse    616--628
                Penghao Sun and   
                  Zehua Guo and   
                  Junfei Li and   
                    Yang Xu and   
                 Julong Lan and   
                     Yuxiang Hu   Enabling Scalable Routing in
                                  Software-Defined Networks With Deep
                                  Reinforcement Learning on Critical Nodes 629--640
                Xiuzhen Guo and   
          Longfei Shangguan and   
                    Yuan He and   
                  Jia Zhang and   
              Haotian Jiang and   
        Awais Ahmad Siddiqi and   
                     Yunhao Liu   Efficient Ambient LoRa Backscatter With
                                  On-Off Keying Modulation . . . . . . . . 641--654
Jorge Martín-Pérez and   
       Francesco Malandrino and   
  Carla Fabiana Chiasserini and   
              Milan Groshev and   
            Carlos J. Bernardos   KPI Guarantees in Network Slicing  . . . 655--668
         Bahman Abolhassani and   
               John Tadrous and   
                Atilla Eryilmaz   Single vs Distributed Edge Caching for
                                  Dynamic Content  . . . . . . . . . . . . 669--682
                 Sergi Rene and   
               Onur Ascigil and   
             Ioannis Psaras and   
                  George Pavlou   A Congestion Control Framework Based on
                                  In-Network Resource Pooling  . . . . . . 683--697
                 Yuchen Liu and   
                Yubing Jian and   
       Raghupathy Sivakumar and   
              Douglas M. Blough   Maximizing Line-of-Sight Coverage for
                                  mmWave Wireless LANs With Multiple
                                  Access Points  . . . . . . . . . . . . . 698--716
                 Hankun Cao and   
                   Qifa Yan and   
                Xiaohu Tang and   
                     Guojun Han   Adaptive Gradient Coding . . . . . . . . 717--734
                    Pan Lai and   
                    Rui Fan and   
                 Xiao Zhang and   
                  Wei Zhang and   
                   Fang Liu and   
               Joey Tianyi Zhou   Utility Optimal Thread Assignment and
                                  Resource Allocation in Multi-Server
                                  Systems  . . . . . . . . . . . . . . . . 735--748
                  Bingyu Li and   
              Jingqiang Lin and   
                 Fengjun Li and   
             Qiongxiao Wang and   
                   Wei Wang and   
                      Qi Li and   
            Guangshen Cheng and   
                  Jiwu Jing and   
                    Congli Wang   The Invisible Side of Certificate
                                  Transparency: Exploring the Reliability
                                  of Monitors in the Wild  . . . . . . . . 749--765
             Ingo van Duijn and   
   Peter Gjòl Jensen and   
    Jesper Stenbjerg Jensen and   
   Troels Beck Krògh and   
          Jonas Sand Madsen and   
              Stefan Schmid and   
           Jirí Srba and   
            Marc Tom Thorgersen   Automata-Theoretic Approach to
                                  Verification of MPLS Networks Under Link
                                  Failures . . . . . . . . . . . . . . . . 766--781
   Sabarish Krishna Moorthy and   
            Maxwell Mcmanus and   
                   Zhangyu Guan   ESN Reinforcement Learning for Spectrum
                                  and Flight Control in THz-Enabled Drone
                                  Networks . . . . . . . . . . . . . . . . 782--795
            Kurian Polachan and   
                Joydeep Pal and   
          Chandramani Singh and   
            T. V. Prabhakar and   
            Fernando A. Kuipers   TCPSbed: a Modular Testbed for Tactile
                                  Internet-Based Cyber-Physical Systems    796--811
                Wenzheng Xu and   
                   Tao Xiao and   
                Junqi Zhang and   
                Weifa Liang and   
                 Zichuan Xu and   
                  Xuxun Liu and   
                Xiaohua Jia and   
                   Sajal K. Das   Minimizing the Deployment Cost of UAVs
                                  for Delay-Sensitive Data Collection in
                                  IoT Networks . . . . . . . . . . . . . . 812--825
              Qiaolun Zhang and   
                Omran Ayoub and   
                     Jun Wu and   
         Francesco Musumeci and   
                  Gaolei Li and   
              Massimo Tornatore   Progressive Slice Recovery With
                                  Guaranteed Slice Connectivity After
                                  Massive Failures . . . . . . . . . . . . 826--839
              Tzu-Hsuan Liu and   
                 Che-Hao Yu and   
               Yi-Jheng Lin and   
            Chia-Ming Chang and   
          Cheng-Shang Chang and   
                  Duan-Shin Lee   ALOHA Receivers: a Network Calculus
                                  Approach for Analyzing Coded Multiple
                                  Access With SIC  . . . . . . . . . . . . 840--854
                 Renyong Wu and   
                 Jieming Ma and   
              Zhixiang Tang and   
                  Xiehua Li and   
         Kim-Kwang Raymond Choo   A Generic Secure Transmission Scheme
                                  Based on Random Linear Network Coding    855--866
              Chenghao Rong and   
            Jessie Hui Wang and   
                 Juncai Liu and   
                Jilong Wang and   
                 Fenghua Li and   
                  Xiaolei Huang   Scheduling Massive Camera Streams to
                                  Optimize Large-Scale Live Video
                                  Analytics  . . . . . . . . . . . . . . . 867--880
                Wenzheng Xu and   
                Yueying Sun and   
                    Rui Zou and   
                Weifa Liang and   
                 Qiufen Xia and   
                  Feng Shan and   
                  Tian Wang and   
                Xiaohua Jia and   
                       Zheng Li   Throughput Maximization of UAV Networks  881--895
               Yanjiao Chen and   
                   Meng Xue and   
                 Jian Zhang and   
                  Runmin Ou and   
                 Qian Zhang and   
                     Peng Kuang   \em DetectDUI: an In-Car Detection
                                  System for Drink Driving and BACs  . . . 896--910

IEEE\slash ACM Transactions on Networking
Volume 30, Number 3, June, 2022

           Ibrahim Kettaneh and   
             Ahmed Alquraan and   
              Hatem Takruri and   
Ali José Mashtizadeh and   
               Samer Al-Kiswany   Accelerating Reads With In-Network
                                  Consistency-Aware Load Balancing . . . . 954--968
                  Zehua Guo and   
                Songshi Dou and   
                    Sen Liu and   
                 Wendi Feng and   
              Wenchao Jiang and   
                    Yang Xu and   
                   Zhi-Li Zhang   Maintaining Control Resiliency and Flow
                                  Programmability in Software-Defined WANs
                                  During Controller Failures . . . . . . . 969--984
                Yaniv Sadeh and   
          Ori Rottenstreich and   
                    Haim Kaplan   Optimal Weighted Load Balancing in TCAMs 985--998
               Zhixiong Niu and   
                   Qiang Su and   
                 Peng Cheng and   
            Yongqiang Xiong and   
                 Dongsu Han and   
             Keith Winstein and   
             Chun Jason Xue and   
                        Hong Xu   NetKernel: Making Network Stack Part of
                                  the Virtualized Infrastructure . . . . . 999--1013
Yordanos Tibebu Woldeyohannes and   
                Besmir Tola and   
               Yuming Jiang and   
             K. K. Ramakrishnan   CoShare: an Efficient Approach for
                                  Redundancy Allocation in NFV . . . . . . 1014--1028
               Zhengkai Shi and   
                Yipeng Zhou and   
                      Di Wu and   
                      Chen Wang   PPVC: Online Learning Toward Optimized
                                  Video Content Caching  . . . . . . . . . 1029--1044
         Ehsan Mohammadpour and   
            Jean-Yves Le Boudec   On Packet Reordering in Time-Sensitive
                                  Networks . . . . . . . . . . . . . . . . 1045--1057
           Khashayar Kamran and   
                 Edmund Yeh and   
                        Qian Ma   DECO: Joint Computation Scheduling,
                                  Caching, and Communication in
                                  Data-Intensive Computing Networks  . . . 1058--1072
            Alon Rashelbach and   
          Ori Rottenstreich and   
               Mark Silberstein   A Computational Approach to Packet
                                  Classification . . . . . . . . . . . . . 1073--1087
                     Hao Li and   
                 Peng Zhang and   
                Guangda Sun and   
                 Wanyue Cao and   
               Chengchen Hu and   
               Danfeng Shan and   
                   Tian Pan and   
                       Qiang Fu   Compiling Cross-Language Network
                                  Programs Into Hybrid Data Plane  . . . . 1088--1103
                 Shuai Tong and   
               Jiliang Wang and   
                     Yunhao Liu   Combating Packet Collisions Using
                                  Non-Stationary Signal Scaling in LPWANs  1104--1117
                    Jia Liu and   
                      Xi Yu and   
                   Xuan Liu and   
                Xingyu Chen and   
                Haisong Liu and   
                Yanyan Wang and   
                     Lijun Chen   Time-Efficient Range Detection in
                                  Commodity RFID Systems . . . . . . . . . 1118--1131
                Kaiyang Liu and   
                   Jun Peng and   
              Jingrong Wang and   
                   Jianping Pan   Optimal Caching for Low Latency in
                                  Distributed Coded Storage Systems  . . . 1132--1145
              Jingzhou Wang and   
              Gongming Zhao and   
                  Hongli Xu and   
                Yutong Zhai and   
               Qianyu Zhang and   
                   He Huang and   
                 Yongqiang Yang   A Robust Service Mapping Scheme for
                                  Multi-Tenant Clouds  . . . . . . . . . . 1146--1161
                Sijie Xiong and   
           Anand D. Sarwate and   
            Narayan B. Mandayam   Network Traffic Shaping for Enhancing
                                  Privacy in IoT Systems . . . . . . . . . 1162--1177
             Chongrong Fang and   
                  Haoyu Liu and   
                   Mao Miao and   
                     Jie Ye and   
                   Lei Wang and   
             Wansheng Zhang and   
               Daxiang Kang and   
                   Biao Lyu and   
                Shunmin Zhu and   
                 Peng Cheng and   
                    Jiming Chen   Towards Automatic Root Cause Diagnosis
                                  of Persistent Packet Loss in Cloud
                                  Overlay Network  . . . . . . . . . . . . 1178--1192
                 Hehuan Shi and   
                       Lin Chen   Downlink Transmission Scheduling With
                                  Data Sharing . . . . . . . . . . . . . . 1193--1202
                 Qingyu Liu and   
                 Haibo Zeng and   
                   Minghua Chen   Minimizing AoI With Throughput
                                  Requirements in Multi-Path Network
                                  Communication  . . . . . . . . . . . . . 1203--1216
Fernando Pérez-Bueno and   
          Luz García and   
Gabriel Maciá-Fernández and   
                  Rafael Molina   Leveraging a Probabilistic PCA Model to
                                  Understand the Multivariate Statistical
                                  Network Monitoring Framework for Network
                                  Security Anomaly Detection . . . . . . . 1217--1229
                 Huaqing Tu and   
              Gongming Zhao and   
                  Hongli Xu and   
              Yangming Zhao and   
                    Yutong Zhai   A Robustness-Aware Real-Time SFC Routing
                                  Update Scheme in Multi-Tenant Clouds . . 1230--1244
                 Hehuan Shi and   
                       Lin Chen   From Spectrum Bonding to
                                  Contiguous-Resource Batching Task
                                  Scheduling . . . . . . . . . . . . . . . 1245--1254
                   Qiong Wu and   
                  Kaiwen He and   
                    Xu Chen and   
                   Shuai Yu and   
                  Junshan Zhang   Deep Transfer Learning Across Cities for
                                  Mobile Traffic Prediction  . . . . . . . 1255--1267
            Abdalla Hussein and   
        Catherine Rosenberg and   
                 Patrick Mitran   Hybrid NOMA in Multi-Cell Networks: From
                                  a Centralized Analysis to Practical
                                  Schemes  . . . . . . . . . . . . . . . . 1268--1282
                   Yiwen Qi and   
                   Wenke Yu and   
                Xudong Zhao and   
                       Xindi Xu   Event-Triggered Control for
                                  Network-Based Switched Systems With
                                  Switching Signals Subject to
                                  Dual-Terminal DoS Attacks  . . . . . . . 1283--1293
              Chaoyun Zhang and   
  Xavier Costa-Pérez and   
                    Paul Patras   Adversarial Attacks Against Deep
                                  Learning-Based Network Intrusion
                                  Detection Systems and Defense Mechanisms 1294--1311
              Guocheng Liao and   
                    Xu Chen and   
                  Jianwei Huang   Privacy-Aware Online Social Networking
                                  With Targeted Advertisement  . . . . . . 1312--1327
                Hongyi Zhou and   
                   Kefan Lv and   
               Longbo Huang and   
                   Xiongfeng Ma   Quantum Network: Security Assessment and
                                  Key Management . . . . . . . . . . . . . 1328--1339
                 Yanyan Han and   
                      Hongyi Wu   Privacy-Aware Participant Recruitment in
                                  Opportunistic Device to Device Networks  1340--1351
                    Jian An and   
              Zhenxing Wang and   
                     Xin He and   
                Xiaolin Gui and   
              Jindong Cheng and   
                     Ruowei Gui   PPQC: a Blockchain-Based
                                  Privacy-Preserving Quality Control
                                  Mechanism in Crowdsensing Applications   1352--1367
               Zhiyuan Wang and   
               Jiancheng Ye and   
                   Dong Lin and   
                 Yipei Chen and   
                 John C. S. Lui   Approximate and Deployable Shortest
                                  Remaining Processing Time Scheduler  . . 1368--1381

IEEE\slash ACM Transactions on Networking
Volume 30, Number 4, 2022

              Ran Ben Basat and   
               Gil Einziger and   
             Isaac Keslassy and   
                 Ariel Orda and   
             Shay Vargaftik and   
                  Erez Waisbard   Memento: Making Sliding Windows
                                  Efficient for Heavy Hitters  . . . . . . 1440--1453
               Junghoon Kim and   
                Taejoon Kim and   
            Morteza Hashemi and   
              David J. Love and   
         Christopher G. Brinton   Minimum Overhead Beamforming and
                                  Resource Allocation in D2D Edge Networks 1454--1468
                   Jie Zhao and   
                       Xin Wang   On the Efficiency of Multi-Beam Medium
                                  Access for Millimeter-Wave Networks  . . 1469--1480
                Xuedou Xiao and   
                   Wei Wang and   
                      Tao Jiang   Sensor-Assisted Rate Adaptation for UAV
                                  MU-MIMO Networks . . . . . . . . . . . . 1481--1493
               Akshay Jajoo and   
              Y. Charlie Hu and   
                    Xiaojun Lin   A Case for Sampling-Based Learning
                                  Techniques in Coflow Scheduling  . . . . 1494--1508
                 Rahul Vaze and   
              Jayakrishnan Nair   Speed Scaling on Parallel Servers With
                                  MapReduce Type Precedence Constraints    1509--1524
                Yuntao Wang and   
                Weiwei Chen and   
                Tom H. Luan and   
                    Zhou Su and   
                  Qichao Xu and   
                 Ruidong Li and   
                       Nan Chen   Task Offloading for Post-Disaster Rescue
                                  in Unmanned Aerial Vehicles Networks . . 1525--1539
               Michael J. Neely   A Converse Result on Convergence Time
                                  for Opportunistic Wireless Scheduling    1540--1553
               Hassan Iqbal and   
                Anand Singh and   
               Muhammad Shahzad   Characterizing the Availability and
                                  Latency in AWS Network From the
                                  Perspective of Tenants . . . . . . . . . 1554--1568
   Seyyedali Hosseinalipour and   
          Sheikh Shams Azam and   
     Christopher G. Brinton and   
         Nicol\`o Michelusi and   
            Vaneet Aggarwal and   
              David J. Love and   
                     Huaiyu Dai   Multi-Stage Hybrid Federated Learning
                                  Over Large-Scale D2D-Enabled Fog
                                  Networks . . . . . . . . . . . . . . . . 1569--1584
               Deepak Nadig and   
           Byrav Ramamurthy and   
                Brian Bockelman   SNAG: SDN-Managed Network Architecture
                                  for GridFTP Transfers Using
                                  Application-Awareness  . . . . . . . . . 1585--1598
                Zhuozhao Li and   
                   Haiying Shen   Co-Scheduler: a Coflow-Aware
                                  Data-Parallel Job Scheduler in Hybrid
                                  Electrical/Optical Datacenter Networks   1599--1612
                     Jun Du and   
             Chunxiao Jiang and   
      Abderrahim Benslimane and   
                   Song Guo and   
                       Yong Ren   SDN-Based Resource Allocation in Edge
                                  and Cloud Computing Systems: an
                                  Evolutionary Stackelberg Differential
                                  Game Approach  . . . . . . . . . . . . . 1613--1628
              Guanglei Song and   
                Jiahai Yang and   
              Zhiliang Wang and   
                     Lin He and   
                 Jinlei Lin and   
                   Long Pan and   
               Chenxin Duan and   
                   Xiaowen Quan   DET: Enabling Efficient Probing of IPv6
                                  Active Addresses . . . . . . . . . . . . 1629--1643
                Zhuozhao Li and   
                 Tanmoy Sen and   
               Haiying Shen and   
                Mooi Choo Chuah   A Study on the Impact of Memory DoS
                                  Attacks on Cloud Applications and
                                  Exploring Real-Time Detection Schemes    1644--1658
               Alden Hilton and   
            Joel Hirschmann and   
                   Casey Deccio   Beware of IPs in Sheep's Clothing:
                                  Measurement and Disclosure of IP
                                  Spoofing Vulnerabilities . . . . . . . . 1659--1673
                 Haibo Wang and   
                  Chaoyi Ma and   
               Shigang Chen and   
                    Yuanda Wang   Fast and Accurate Cardinality Estimation
                                  by Self-Morphing Bitmaps . . . . . . . . 1674--1688
                Xiao-Yan Li and   
                Wanling Lin and   
             Jou-Ming Chang and   
                    Xiaohua Jia   Transmission Failure Analysis of
                                  Multi-Protection Routing in Data Center
                                  Networks With Heterogeneous Edge-Core
                                  Servers  . . . . . . . . . . . . . . . . 1689--1702
               Yunxiang Cai and   
                 Hongzi Zhu and   
                 Shan Chang and   
                  Xiao Wang and   
              Jiangang Shen and   
                      Minyi Guo   PeerProbe: Estimating Vehicular Neighbor
                                  Distribution With Adaptive Compressive
                                  Sensing  . . . . . . . . . . . . . . . . 1703--1716
                  Chang Liu and   
            Jean Tourrilhes and   
             Chen-Nee Chuah and   
                  Puneet Sharma   Voyager: Revisiting Available Bandwidth
                                  Estimation With a New Class of Methods
                                  --- Decreasing- Chirp-Train Methods  . . 1717--1732
                 Edwin Yang and   
                  Song Fang and   
               Ian Markwood and   
                    Yao Liu and   
             Shangqing Zhao and   
                    Zhuo Lu and   
                     Haojin Zhu   Wireless Training-Free Keystroke
                                  Inference Attack and Defense . . . . . . 1733--1748
            Swaroop Gopalam and   
           Stephen V. Hanly and   
                 Philip Whiting   Distributed and Local Scheduling
                                  Algorithms for mmWave Integrated Access
                                  and Backhaul . . . . . . . . . . . . . . 1749--1764
                 Junsong Fu and   
                    Na Wang and   
                  Leyao Nie and   
               Baojiang Cui and   
             Bharat K. Bhargava   Defending Trace-Back Attack in $3$D
                                  Wireless Internet of Things  . . . . . . 1765--1779
         Ehsan Mohammadpour and   
            Jean-Yves Le Boudec   Analysis of Dampers in Time-Sensitive
                                  Networks With Non-Ideal Clocks . . . . . 1780--1794
           Zaid H. Nasralla and   
     Taisir E. H. Elgorashi and   
                Ali Hammadi and   
         Mohamed O. I. Musa and   
        Jaafar M. H. Elmirghani   Blackout Resilient Optical Core Network  1795--1806
                Yuting Wang and   
             Xiaolong Zheng and   
                  Liang Liu and   
                     Huadong Ma   PolarTracker: Attitude-Aware Channel
                                  Access for Floating Low Power Wide Area
                                  Networks . . . . . . . . . . . . . . . . 1807--1821
                Artur Sterz and   
              Patrick Felka and   
                Bernd Simon and   
               Sabrina Klos and   
                 Anja Klein and   
                Oliver Hinz and   
               Bernd Freisleben   Multi-Stakeholder Service Placement via
                                  Iterative Bargaining With Incomplete
                                  Information  . . . . . . . . . . . . . . 1822--1837
                  Chen Avin and   
             Kaushik Mondal and   
                  Stefan Schmid   Demand-Aware Network Design With Minimal
                                  Congestion and Route Lengths . . . . . . 1838--1848
                Kaiping Xue and   
                 Peixuan He and   
                 Jiayu Yang and   
                Qiudong Xia and   
                David S. L. Wei   SCD2: Secure Content Delivery and
                                  Deduplication With Multiple Content
                                  Providers in Information Centric
                                  Networking . . . . . . . . . . . . . . . 1849--1864
           Sladana Jo\vsilo and   
         György Dán   Joint Wireless and Edge Computing
                                  Resource Management With Dynamic Network
                                  Slice Selection  . . . . . . . . . . . . 1865--1878

IEEE\slash ACM Transactions on Networking
Volume 30, Number 5, 2022

   Ji\vrí Matou\vsek and   
     Adam Lu\vcanský and   
            David Jane\vcek and   
                 Jozef Sabo and   
              Jan Ko\vrenek and   
                 Gianni Antichi   ClassBench-ng: Benchmarking Packet
                                  Classification Algorithms in the
                                  OpenFlow Era . . . . . . . . . . . . . . 1912--1925
          Mohammad Jahanian and   
             K. K. Ramakrishnan   CoNICE: Consensus in
                                  Intermittently-Connected Environments by
                                  Exploiting Naming With Application to
                                  Emergency Response . . . . . . . . . . . 1926--1939
            Nilanjan Biswas and   
                 Goutam Das and   
                   Priyadip Ray   Buffer-Aware User Selection and Resource
                                  Allocation for an Opportunistic
                                  Cognitive Radio Network: a Cross-Layer
                                  Approach . . . . . . . . . . . . . . . . 1940--1954
                    Kun Xie and   
              Jiazheng Tian and   
                   Xin Wang and   
                Gaogang Xie and   
               Jiannong Cao and   
               Hongbo Jiang and   
                     Jigang Wen   Fast Retrieval of Large Entries With
                                  Incomplete Measurement Data  . . . . . . 1955--1969
               Sushovan Das and   
             Afsaneh Rahbar and   
           Xinyu Crystal Wu and   
                Zhuang Wang and   
                Weitao Wang and   
                   Ang Chen and   
                T. S. Eugene Ng   Shufflecast: an Optical, Data-Rate
                                  Agnostic, and Low-Power Multicast
                                  Architecture for Next-Generation Compute
                                  Clusters . . . . . . . . . . . . . . . . 1970--1985
               Hai-Anh Tran and   
                   Duc Tran and   
             Abdelhamid Mellouk   State-Dependent Multi-Constraint
                                  Topology Configuration for
                                  Software-Defined Service Overlay
                                  Networks . . . . . . . . . . . . . . . . 1986--2001
    Nurullah Karakoç and   
             Anna Scaglione and   
           Martin Reisslein and   
                     Ruiyuan Wu   Federated Edge Network Utility
                                  Maximization for a Multi-Server System:
                                  Algorithm and Convergence  . . . . . . . 2002--2017
            Pooja Vyavahare and   
          Jayakrishnan Nair and   
                   D. Manjunath   Sponsored Data: On the Effect of ISP
                                  Competition on Pricing Dynamics and
                                  Content Provider Market Structures . . . 2018--2031
             Zhenghao Zhang and   
               Raghav Rathi and   
               Steven Perez and   
             Jumana Bukhari and   
                 Yaoguang Zhong   ZCNET: Achieving High Capacity in Low
                                  Power Wide Area Networks . . . . . . . . 2032--2045
              Chengzhang Li and   
                 Qingyu Liu and   
                 Shaoran Li and   
                Yongce Chen and   
              Y. Thomas Hou and   
                Wenjing Lou and   
                Sastry Kompella   Scheduling With Age of Information
                                  Guarantee  . . . . . . . . . . . . . . . 2046--2059
                    Meng Li and   
               Liehuang Zhu and   
               Zijian Zhang and   
                Chhagan Lal and   
                Mauro Conti and   
                  Mamoun Alazab   User-Defined Privacy-Preserving Traffic
                                  Monitoring Against $n$-by-1 Jamming
                                  Attack . . . . . . . . . . . . . . . . . 2060--2073
              Gaoxiong Zeng and   
                    Wei Bai and   
                    Ge Chen and   
                   Kai Chen and   
                 Dongsu Han and   
                   Yibo Zhu and   
                        Lei Cui   Congestion Control for Cross-Datacenter
                                  Networks . . . . . . . . . . . . . . . . 2074--2089
                    Chun Li and   
                Yunyun Yang and   
                  Hui Liang and   
                      Boying Wu   Learning Quantum Drift-Diffusion
                                  Phenomenon by Physics-Constraint Machine
                                  Learning . . . . . . . . . . . . . . . . 2090--2101
             Kevin D. Smith and   
            Saber Jafarpour and   
            Ananthram Swami and   
                Francesco Bullo   Topology Inference With Multivariate
                                  Cumulants: The Möbius Inference Algorithm 2102--2116
             Guangyang Zeng and   
                 Biqiang Mu and   
               Jieqiang Wei and   
            Wing Shing Wong and   
                     Junfeng Wu   Localizability With Range-Difference
                                  Measurements: Numerical Computation and
                                  Error Bound Analysis . . . . . . . . . . 2117--2130
                 Yunshu Liu and   
               Zhixuan Fang and   
             Man Hon Cheung and   
                    Wei Cai and   
                  Jianwei Huang   An Incentive Mechanism for Sustainable
                                  Blockchain Storage . . . . . . . . . . . 2131--2144
                   Hui Yang and   
                 Qiuyan Yao and   
                  Bowen Bao and   
                      Ao Yu and   
                  Jie Zhang and   
        Athanasios V. Vasilakos   Multi-Associated Parameters
                                  Aggregation-Based Routing and Resources
                                  Allocation in Multi-Core Elastic Optical
                                  Networks . . . . . . . . . . . . . . . . 2145--2157
                 Renjie Xie and   
                 Jiahao Cao and   
                      Qi Li and   
                    Kun Sun and   
                  Guofei Gu and   
                 Mingwei Xu and   
                      Yuan Yang   Disrupting the SDN Control Channel via
                                  Shared Links: Attacks and
                                  Countermeasures  . . . . . . . . . . . . 2158--2172
                        Lin Dai   A Theoretical Framework for Random
                                  Access: Stability Regions and
                                  Transmission Control . . . . . . . . . . 2173--2200
               Xuezheng Liu and   
              Zhicong Zhong and   
                Yipeng Zhou and   
                      Di Wu and   
                    Xu Chen and   
                   Min Chen and   
                  Quan Z. Sheng   Accelerating Federated Learning via
                                  Parallel Servers: a Theoretically
                                  Guaranteed Approach  . . . . . . . . . . 2201--2215
Seyed Mohammadhossein Tabatabaee and   
            Jean-Yves Le Boudec   Deficit Round-Robin: a Second Network
                                  Calculus Analysis  . . . . . . . . . . . 2216--2230
                    Feng Li and   
                Jichao Zhao and   
                Dongxiao Yu and   
              Xiuzhen Cheng and   
                     Weifeng Lv   Harnessing Context for Budget-Limited
                                  Crowdsensing With Massive Uncertain
                                  Workers  . . . . . . . . . . . . . . . . 2231--2245
                  Hongli Xu and   
                    Peng Xi and   
              Gongming Zhao and   
               Jianchun Liu and   
                  Chen Qian and   
                 Liusheng Huang   SAFE-ME: Scalable and Flexible Policy
                                  Enforcement in Middlebox Networks  . . . 2246--2261
                   Lin Chen and   
                   Shan Lin and   
                  Hua Huang and   
                    Weihua Yang   Charging Path Optimization in Mobile
                                  Networks . . . . . . . . . . . . . . . . 2262--2273
                  Lei Zhang and   
                   Yong Cui and   
                 Mowei Wang and   
                  Kewei Zhu and   
                   Yibo Zhu and   
                     Yong Jiang   DeepCC: Bridging the Gap Between
                                  Congestion Control and Applications via
                                  Multiobjective Optimization  . . . . . . 2274--2288
             Minghui Liwang and   
                   Xianbin Wang   Overbooking-Empowered Computing Resource
                                  Provisioning in Cloud-Aided Mobile Edge
                                  Networks . . . . . . . . . . . . . . . . 2289--2303
                    Lei Shi and   
                Yuhua Cheng and   
              Jinliang Shao and   
               Qingchen Liu and   
                 Wei Xing Zheng   Locating Link Failures in WSNs via
                                  Cluster Consensus and Graph
                                  Decomposition  . . . . . . . . . . . . . 2304--2314
         Bahman Abolhassani and   
               John Tadrous and   
            Atilla Eryilmaz and   
                     Edmund Yeh   Fresh Caching of Dynamic Content Over
                                  the Wireless Edge  . . . . . . . . . . . 2315--2327
                 Zhenlin An and   
             Qiongzheng Lin and   
                   Lei Yang and   
                        Lei Xie   Tagcaster: Activating Wireless Voice of
                                  Electronic Toll Collection Systems With
                                  Zero Start-Up Cost . . . . . . . . . . . 2328--2342
             Hyunseok Chang and   
            Matteo Varvello and   
                   Fang Hao and   
                Sarit Mukherjee   A Tale of Three Videoconferencing
                                  Applications: Zoom, Webex, and Meet  . . 2343--2358

IEEE\slash ACM Transactions on Networking
Volume 30, Number 6, 2022

                Zhenhua Han and   
               Haisheng Tan and   
                   Rui Wang and   
               Yuncong Hong and   
              Francis C. M. Lau   Efficient Online Learning Based
                                  Cross-Tier Uplink Scheduling in HetNets  2389--2402
           Gregor Bankhamer and   
       Robert Elsässer and   
                  Stefan Schmid   Local Fast Rerouting With Low
                                  Congestion: a Randomized Approach  . . . 2403--2418
                  Chen Avin and   
             Kaushik Mondal and   
                  Stefan Schmid   Push-Down Trees: Optimal Self-Adjusting
                                  Complete Trees . . . . . . . . . . . . . 2419--2432
                   Tian Xie and   
            Namitha Nambiar and   
                    Ting He and   
               Patrick McDaniel   Attack Resilience of Cache Replacement
                                  Policies: a Study Based on TTL
                                  Approximation  . . . . . . . . . . . . . 2433--2447
        Marcel Blöcher and   
                   Lin Wang and   
            Patrick Eugster and   
                    Max Schmidt   Holistic Resource Scheduling for Data
                                  Center In-Network Computing  . . . . . . 2448--2463
                Theo Jepsen and   
          Ali Fattaholmanan and   
             Masoud Moshref and   
                Nate Foster and   
          Antonio Carzaniga and   
            Robert Soulé   Forwarding and Routing With Packet
                                  Subscriptions  . . . . . . . . . . . . . 2464--2479
              Tianjiao Wang and   
                Zengfu Wang and   
                 Bill Moran and   
                 Moshe Zukerman   Submarine Cable Network Design for
                                  Regional Connectivity  . . . . . . . . . 2480--2492
               Xiaozhe Shao and   
                 Zibin Chen and   
             Daniel Holcomb and   
                      Lixin Gao   Accelerating BGP Configuration
                                  Verification Through Reducing Cycles in
                                  SMT Constraints  . . . . . . . . . . . . 2493--2504
                   Yang Cai and   
               Jaime Llorca and   
          Antonia M. Tulino and   
             Andreas F. Molisch   Ultra-Reliable Distributed Cloud Network
                                  Control With End-to-End Latency
                                  Constraints  . . . . . . . . . . . . . . 2505--2520
           Reena Chackochan and   
               Albert Sunny and   
      Senthilkumar Dhanasekaran   Approximate Aggregate Utility
                                  Maximization Using Greedy Maximal
                                  Scheduling . . . . . . . . . . . . . . . 2521--2530
    Massieh Kordi Boroujeny and   
                  Brian L. Mark   Design of a Stochastic Traffic Regulator
                                  for End-to-End Network Delay Guarantees  2531--2543
              Darryl Veitch and   
       Sathiya Kumaran Mani and   
                     Yi Cao and   
                   Paul Barford   iHorology: Lowering the Barrier to
                                  Microsecond-Level Internet Time  . . . . 2544--2558
              Sijiang Huang and   
                 Mowei Wang and   
                       Yong Cui   Traffic-Aware Buffer Management in
                                  Shared Memory Switches . . . . . . . . . 2559--2573
               Qingfeng Tan and   
                Xuebin Wang and   
                    Wei Shi and   
                  Jian Tang and   
                   Zhihong Tian   An Anonymity Vulnerability in Tor  . . . 2574--2587
                 Xuehe Wang and   
                   Lingjie Duan   Dynamic Pricing and Mean Field Analysis
                                  for Controlling Age of Information . . . 2588--2600
                 Zichuan Xu and   
                 Haozhe Ren and   
                Weifa Liang and   
                 Qiufen Xia and   
                Wanlei Zhou and   
                   Pan Zhou and   
                Wenzheng Xu and   
                  Guowei Wu and   
                     Mingchu Li   Near Optimal Learning-Driven Mechanisms
                                  for Stable NFV Markets in Multitier
                                  Cloud Networks . . . . . . . . . . . . . 2601--2615
               Xianhao Chen and   
                Guangyu Zhu and   
              Haichuan Ding and   
                  Lan Zhang and   
               Haixia Zhang and   
                   Yuguang Fang   End-to-End Service Auction: a General
                                  Double Auction Mechanism for Edge
                                  Computing Services . . . . . . . . . . . 2616--2629
       Keerthi Priya Dasala and   
            Josep M. Jornet and   
             Edward W. Knightly   Scaling mmWave WLANs With Single RF
                                  Chain Multiuser Beamforming  . . . . . . 2630--2643
                    Tie Qiu and   
                 Lidi Zhang and   
                  Ning Chen and   
              Songwei Zhang and   
                Wenyuan Liu and   
               Dapeng Oliver Wu   Born This Way: a Self-Organizing
                                  Evolution Scheme With Motif for Internet
                                  of Things Robustness . . . . . . . . . . 2644--2657
                Zhiyuan Yao and   
          Yoann Desmouceaux and   
Juan-Antonio Cordero-Fuertes and   
              Mark Townsley and   
                 Thomas Clausen   HLB: Toward Load-Aware Load Balancing    2658--2673
               Itamar Cohen and   
               Gil Einziger and   
               Gabriel Scalosub   False Negative Awareness in
                                  Indicator-Based Caching Systems  . . . . 2674--2687
              Dianxiong Liu and   
                 Zhiyong Du and   
                 Xiaodu Liu and   
                  Heyu Luan and   
                   Yitao Xu and   
                       Yifan Xu   Task-Based Network Reconfiguration in
                                  Distributed UAV Swarms: a Bilateral
                                  Matching Approach  . . . . . . . . . . . 2688--2700
             Ludovic Thomas and   
             Ahlem Mifdaoui and   
            Jean-Yves Le Boudec   Worst-Case Delay Bounds in
                                  Time-Sensitive Networks With Packet
                                  Replication and Elimination  . . . . . . 2701--2715
                Zhiwei Zhao and   
               Wenliang Mao and   
                 Geyong Min and   
                    Weifeng Gao   Joint Multichannel-Spatial Diversity for
                                  Efficient Opportunistic Routing in
                                  Low-Power Wireless Networks  . . . . . . 2716--2729
                 Miao Zhang and   
                  Yifei Zhu and   
             Jiangchuan Liu and   
                  Feng Wang and   
                   Fangxin Wang   CharmSeeker: Automated Pipeline
                                  Configuration for Serverless Video
                                  Processing . . . . . . . . . . . . . . . 2730--2743
                   Luoyi Fu and   
              Jiapeng Zhang and   
                    Shan Qu and   
                Huquan Kang and   
               Xinbing Wang and   
                    Guihai Chen   Measuring Social Network
                                  De-Anonymizability by Means of Morphism
                                  Property . . . . . . . . . . . . . . . . 2744--2759
                    Yao Xin and   
                  Wenjun Li and   
               Guoming Tang and   
                  Tong Yang and   
                  Xiaohe Hu and   
                        Yi Wang   FPGA-Based Updatable Packet
                                  Classification Using TSS-Combined
                                  Bit-Selecting Tree . . . . . . . . . . . 2760--2775
             Nishant Shakya and   
                     Fan Li and   
                   Jinyuan Chen   On Distributed Computing With
                                  Heterogeneous Communication Constraints  2776--2787
                  Xinzhe Fu and   
                  Eytan Modiano   Learning-NUM: Network Utility
                                  Maximization With Unknown Utility
                                  Functions and Queueing Delay . . . . . . 2788--2803
               Zhirong Shen and   
                 Guanglin Zhang   Competitive Online Stay-or-Switch
                                  Algorithms With Minimum Commitment and
                                  Switching Cost . . . . . . . . . . . . . 2804--2817


IEEE\slash ACM Transactions on Networking
Volume 31, Number 1, 2023

                 Huikang Li and   
                     Yi Gao and   
                   Wei Dong and   
                      Chun Chen   Bound-Based Network Tomography for
                                  Inferring Interesting Path Metrics . . . 1--14
         Eric Ruzomberkaand and   
                  David J. Love   Interference Moral Hazard in Large
                                  Multihop Networks  . . . . . . . . . . . 15--29
             Anirudh Sabnis and   
             Tareq Si Salem and   
            Giovanni Neglia and   
            Michele Garetto and   
            Emilio Leonardi and   
            Ramesh K. Sitaraman   GRADES: Gradient Descent for Similarity
                                  Caching  . . . . . . . . . . . . . . . . 30--41
                    Xi Chen and   
                 Qiao Xiang and   
                Linghe Kong and   
                  Huisan Xu and   
                        Xue Liu   Learning From FM Communications: Toward
                                  Accurate, Efficient, All-Terrain Vehicle
                                  Localization . . . . . . . . . . . . . . 42--57
                 Haoyu Wang and   
                 Zetian Liu and   
                   Haiying Shen   Machine Learning Feature Based Job
                                  Scheduling for Distributed Machine
                                  Learning Clusters  . . . . . . . . . . . 58--73
                 Xujin Zhou and   
               Irem Koprulu and   
            Atilla Eryilmaz and   
               Michael J. Neely   Efficient Distributed MAC for Dynamic
                                  Demands: Congestion and Age Based
                                  Designs  . . . . . . . . . . . . . . . . 74--87
             Federico Mason and   
        Gianfranco Nencioni and   
                 Andrea Zanella   Using Distributed Reinforcement Learning
                                  for Resource Orchestration in a Network
                                  Slicing Scenario . . . . . . . . . . . . 88--102
                 Jiao Zhang and   
             Xiaolong Zhong and   
                  Zirui Wan and   
                    Yu Tian and   
                   Tian Pan and   
                      Tao Huang   RCC: Enabling Receiver-Driven RDMA
                                  Congestion Control With Congestion
                                  Divide-and-Conquer in Datacenter
                                  Networks . . . . . . . . . . . . . . . . 103--117
               Shaopeng Zhu and   
             Xiaolong Zheng and   
                  Liang Liu and   
                     Huadong Ma   CSMA/PJ: a Protective Jamming Based MAC
                                  Protocol to Harmonize the Long and Short
                                  Links  . . . . . . . . . . . . . . . . . 118--132
     Konstantinos Oikonomou and   
         George Koufoudakis and   
             Sonia A\"\issa and   
            Ioannis Stavrakakis   Probabilistic Flooding Performance
                                  Analysis Exploiting Graph Spectra
                                  Properties . . . . . . . . . . . . . . . 133--146
              Juncheng Wang and   
                   Min Dong and   
                  Ben Liang and   
              Gary Boudreau and   
                Hatem Abou-Zeid   Delay-Tolerant OCO With Long-Term
                                  Constraints: Algorithm and Its
                                  Application to Network Resource
                                  Allocation . . . . . . . . . . . . . . . 147--163
               Xiaochun Yun and   
                Yipeng Wang and   
            Yongzheng Zhang and   
                  Chen Zhao and   
                    Zijian Zhao   Encrypted TLS Traffic Classification on
                                  Cloud Platforms  . . . . . . . . . . . . 164--177
                 Shouxi Luo and   
                Pingzhi Fan and   
               Huanlai Xing and   
                    Hongfang Yu   Meeting Coflow Deadlines in Data Center
                                  Networks With Policy-Based Selective
                                  Completion . . . . . . . . . . . . . . . 178--191
               Zhehui Zhang and   
                 Yuanjie Li and   
                  Qianru Li and   
               Jinghao Zhao and   
               Ghufran Baig and   
                   Lili Qiu and   
                      Songwu Lu   Movement-Based Reliable Mobility
                                  Management for Beyond 5G Cellular
                                  Networks . . . . . . . . . . . . . . . . 192--207
                Tongyu Zong and   
                    Chen Li and   
               Yuanyuan Lei and   
                 Guangyu Li and   
                 Houwei Cao and   
                       Yong Liu   Cocktail Edge Caching: Ride Dynamic
                                  Trends of Content Popularity With
                                  Ensemble Learning  . . . . . . . . . . . 208--219
                   Cao Chen and   
                   Fen Zhou and   
          Massimo Tornatore and   
                    Shilin Xiao   Maximizing Revenue With Adaptive
                                  Modulation and Multiple FECs in Flexible
                                  Optical Networks . . . . . . . . . . . . 220--233
            Chia-Ming Chang and   
               Yi-Jheng Lin and   
          Cheng-Shang Chang and   
                  Duan-Shin Lee   On the Stability Regions of Coded
                                  Poisson Receivers With Multiple Classes
                                  of Users and Receivers . . . . . . . . . 234--247
              Gongming Zhao and   
                  Luyao Luo and   
                  Hongli Xu and   
             Chun-Jen Chung and   
                    Liguang Xie   Southbound Message Delivery With Virtual
                                  Network Topology Awareness in Clouds . . 248--263
       Francesco Malandrino and   
  Carla Fabiana Chiasserini and   
               Nuria Molner and   
            Antonio de la Oliva   Network Support for High-Performance
                                  Distributed Machine Learning . . . . . . 264--278
                    Chao Xu and   
            Jessie Hui Wang and   
                Jilong Wang and   
                     Tao Yu and   
                Yipeng Zhou and   
                 Yuedong Xu and   
                      Di Wu and   
                   Changqing An   Offloading Elastic Transfers to
                                  Opportunistic Vehicular Networks Based
                                  on Imperfect Trajectory Prediction . . . 279--293
João Luís Sobrinho and   
          Miguel Alves Ferreira   From Non-Optimal Routing Protocols to
                                  Routing on Multiple Optimality Criteria  294--307
                 Xudong Qin and   
                     Bin Li and   
                       Lei Ying   Efficient Distributed Threshold-Based
                                  Offloading for Large-Scale Mobile Cloud
                                  Computing  . . . . . . . . . . . . . . . 308--321
               Akbar Majidi and   
               Xiaofeng Gao and   
                Shunjia Zhu and   
         Nazila Jahanbakhsh and   
                Jiaqi Zheng and   
                    Guihai Chen   MiFi: Bounded Update to Optimize Network
                                  Performance in Software-Defined Data
                                  Centers  . . . . . . . . . . . . . . . . 322--335
                    Ge Wang and   
               Xiaofeng Shi and   
                 Haofan Cai and   
                  Chen Qian and   
                   Han Ding and   
                     Wei Xi and   
                   Kun Zhao and   
               Jizhong Zhao and   
                    Jinsong Han   A Generalized Method to Combat
                                  Multipaths for RFID Sensing  . . . . . . 336--351
                  Chi Zhang and   
               Haisheng Tan and   
             Haoqiang Huang and   
                Zhenhua Han and   
       Shaofeng H.-C. Jiang and   
                 Guopeng Li and   
                  Xiang-Yang Li   Online Approximation Scheme for
                                  Scheduling Heterogeneous Utility Jobs in
                                  Edge Computing . . . . . . . . . . . . . 352--365
                   Qiang Wu and   
       Xiangping Bryce Zhai and   
                     Xi Liu and   
               Chun-Ming Wu and   
              Fangliang Lou and   
                   Hongke Zhang   Performance Tuning via Lean Measurements
                                  for Acceleration of Network Functions
                                  Virtualization . . . . . . . . . . . . . 366--379
                  Yijun Hao and   
                    Fang Li and   
                  Cong Zhao and   
                    Shusen Yang   Delay-Oriented Scheduling in 5G Downlink
                                  Wireless Networks Based on Reinforcement
                                  Learning With Partial Observations . . . 380--394
                  Shaoke Xi and   
                     Kai Bu and   
                 Wensen Mao and   
               Xiaoyu Zhang and   
                    Kui Ren and   
                     Xinxin Ren   RuleOut Forwarding Anomalies for SDN . . 395--407
                  Jiayu Pan and   
            Ahmed M. Bedewy and   
                    Yin Sun and   
                 Ness B. Shroff   Optimal Sampling for Data Freshness:
                                  Unreliable Transmissions With Random
                                  Two-Way Delay  . . . . . . . . . . . . . 408--420
               Shaofei Tang and   
               Sicheng Zhao and   
                Xiaoqin Pan and   
                     Zuqing Zhu   How to Use In-Band Network Telemetry
                                  Wisely: Network-Wise Orchestration of
                                  Sel-INT  . . . . . . . . . . . . . . . . 421--435