Last update:
Sat Nov 23 17:07:15 MST 2024
Mark B. Abbott and Larry L. Peterson A language-based approach to protocol implementation . . . . . . . . . . . . . 4--19 P. Venkat Rangan and Harrick M. Vin and Srinivas Ramanathan Communication architectures and algorithms for media mixing in multimedia conferences . . . . . . . . . 20--30 V. Ramaswami and Jonathan L. Wang Analysis of the link error monitoring protocols in the common channel signaling network . . . . . . . . . . . 31--47 Clark Wang and Mischa Schwartz Fault detection with multiple observers 48--55 Deborah Estrin and Martha Steenstrup and Gene Tsudik A protocol for route establishment and packet forwarding across multidomain Internets . . . . . . . . . . . . . . . 56--70 Mark W. Garrett and Martin Vetterli Joint source/channel coding of statistically multiplexed real-time services on packet networks . . . . . . 71--80 Pierre Humblet and Amit Bhargava and Michael G. Hluchyj Ballot theorems applied to the transient analysis of nD/D/1 queues . . . . . . . 81--95 Oran Sharon and Adrian Segall A simple scheme for slot reuse without latency for a dual bus configuration . . 96--104 Shun-Ping Chung and Arik Kashper and Keith W. Ross Computing approximate blocking probabilities for large loss networks with state-dependent routing . . . . . . 105--115 Raymond E. Miller and Sanjoy Paul On the generation of minimal-length conformance tests for communication protocols . . . . . . . . . . . . . . . 116--129 J. J. Garcia-Lunes-Aceves Loop-free routing using diffusing computations . . . . . . . . . . . . . . 130--141 David X. Chen and Jon W. Mark SCOQ: a fast packet switch with shared concentration and output queueing . . . 142--151
Wen De Zhong and Jaidev Kaniyil and Y. Onozato A copy network with shared buffers for large-scale multicast ATM switching . . 157--165 Subramanian Ramanathan and Errol L. Lloyd Scheduling algorithms for multihop radio networks . . . . . . . . . . . . . . . . 166--177 C. Murray Woodside and R. Greg Franks Alternative software architectures for parallel protocol execution with synchronous IPC . . . . . . . . . . . . 178--186 Ariel Orda and Raphael Rom and Moshe Sidi Minimum delay routing in stochastic networks . . . . . . . . . . . . . . . . 187--198 Christos Papadopoulos and Gurudatta M. Parulkar Experimental evaluation of SUNOS IPC and TCP/IP protocol implementation . . . . . 199--216 David M. Kristol and David Lee and Arun N. Netravali and Krishan Sabnani A polynomial algorithm for gateway generation from formal specifications 217--229 Qinglin Wang and Victor S. Frost Efficient estimation of cell blocking probability for ATM systems . . . . . . 230--235 Kin K. Leung and Raymond W. Yeung and Bhaskar Sengupta A credit manager for traffic regulation in high-speed networks: a queueing analysis . . . . . . . . . . . . . . . . 236--245 Srinivas Ramanathan and P. Venkat Rangan Adaptive feedback techniques for synchronized multimedia retrieval over integrated networks . . . . . . . . . . 246--260 Richard J. Gibbens and Frank P. Kelly and Stephen R. E. Turner Dynamic routing in multiparented networks . . . . . . . . . . . . . . . . 261--270
Mehran Bagheri and Dennis T. Kong and Wayne S. Holden and Fernando C. Irizarry and Derek D. Mahoney An STS-N byte-interleaving multiplexer/scrambler and demultiplexer/descrambler architecture and its experimental OC-48 implementation . . . . . . . . . . . . . 282--285 Vachaspathi P. Kompella and Joseph C. Pasquale and George C. Polyzos Multicast routing for multimedia communication . . . . . . . . . . . . . 286--292 Michael Devetsikiotis and J. Keith Townsend Statistical optimization of dynamic importance sampling parameters for efficient simulation of communication networks . . . . . . . . . . . . . . . . 293--305 Ilan Kessler and Arvind Krishna On the cost of fairness in ring networks 306--313 Achille Pattavina and Giacomo Bruzzi Analysis of input and output queueing for nonblocking ATM switches . . . . . . 314--328 Anwar I. Elwalid and Debasis Mitra Effective bandwidth of general Markovian traffic sources and admission control of high speed networks . . . . . . . . . . 329--343 Abhay K. Parekh and Robert G. Gallager A generalized processor sharing approach to flow control in integrated services networks: the single-node case . . . . . 344--357 Hasan Ural and Keqin Zhu Optimal length test sequence generation using distinguishing sequences . . . . . 358--371 Opher Yaron and Moshe Sidi Performance and stability of communication networks via robust exponential bounds . . . . . . . . . . . 372--385 Hosame Abu-Amara A fast topology maintenance algorithm for high-bandwidth networks . . . . . . 386--394
Sally Floyd and Van Jacobson Random early detection gateways for congestion avoidance . . . . . . . . . . 397--413 Luping Liang and Gerald W. Neufeld and Samuel T. Chanson A name model for nested group communication . . . . . . . . . . . . . 414--423 George Kesidis and Jean Walrand and Cheng-Shang Chang Effective bandwidths for multiclass Markov fluids and other ATM sources . . 424--428 Craig Partridge and Stephen Pink A faster UDP . . . . . . . . . . . . . . 429--440 Gerard R. Pieris and Galen H. Sasaki A linear lightwave Benes network . . . . 441--445 Paul Skelly and Mischa Schwartz and Sudhir Dixit A histogram-based model for video traffic behavior in an ATM multiplexer 446--459 André Girard and Bernard Liau Dimensioning of adaptively routed networks . . . . . . . . . . . . . . . . 460--468 Israel Cidon and Inder S. Gopal and Adrian Segall Connection establishment in high-speed networks . . . . . . . . . . . . . . . . 469--481 Giuseppe Bianchi and Jonathan S. Turner Improved queueing analysis of shared buffer switching networks . . . . . . . 482--490 Michael P. Rumsewicz Analysis of the effects of SS7 message discard schemes on call completion rates during overload . . . . . . . . . . . . 491--502
Mohammad Ghanbari and Charles J. Hughes Packing coded video signals into ATM cells . . . . . . . . . . . . . . . . . 505--509 Ariel Orda and Raphael Rom and Nahum Shimkin Competitive routing in multiuser communication networks . . . . . . . . . 510--521 San-qi Li and Chia-Lin Hwang Queue response to input correlation functions: discrete spectral analysis 522--533 M. Ajmone Marsan and Andrea Bianco and Emilio Leonardi and Fabio Neri Topologies for wavelength-routing all-optical networks . . . . . . . . . . 534--546 Steven H. Low and Pravin P. Varaiya A new approach to service provisioning in ATM networks . . . . . . . . . . . . 547--553 Chandramohan A. Thekkath and Thu D. Nguyen and Evelyn Moy and Edward D. Lazowska Implementing network protocols at user level . . . . . . . . . . . . . . . . . 554--565 Paolo Coppo and Matteo D'Ambrosio and Riccardo Melen Optimal cost/performance design of ATM switches . . . . . . . . . . . . . . . . 566--575 Randall Landry and Ioannis Stavrakakis Queueing study of a $3$-priority policy with distinct service strategies . . . . 576--589 Deepinder P. Sidhu and Howard Motteler and Raghu Vallurupalli On testing hierarchies for protocols . . 590--599 Mark B. Abbott and Larry L. Peterson Increasing network throughput by integrating protocol layers . . . . . . 600--610
Ron Cocchi and Scott Shenker and Deborah Estrin and Lixia Zhang Pricing in computer networks: motivation, formulation, and example . . 614--627 Andrea Baiocchi and Nicola Bléfari-Melazzi An error-controlled approximate analysis of a stochastic fluid flow model applied to an ATM multiplexer with heterogeneous On-Off sources . . . . . . . . . . . . . 628--637 Xing Chen and Jeremiah F. Hayes Access control in multicast packet switching . . . . . . . . . . . . . . . 638--649 Matthias Kaiserswerth The Parallel Protocol Engine . . . . . . 650--663 Erik A. van Doorn and Frans J. M. Panken Blocking probabilities in a loss system with arrivals in geometrically distributed batches and heterogeneous service requirements . . . . . . . . . . 664--667 Limin Hu Distributed code assignments for CDMA Packet Radio Network . . . . . . . . . . 668--677 San-qi Li and Chia-Lin Hwang Queue response to input correlation functions: continuous spectral analysis 678--692 Lotfi Benmohamed and Semyon M. Meerkov Feedback control of congestion in packet switching networks: the case of a single congested node . . . . . . . . . . . . . 693--708 Duan-Shin Lee and Bhaskar Sengupta Queueing analysis of a threshold based priority scheme for ATM networks . . . . 709--717 Leonidas Georgiadis and Roch Guérin and Israel Cidon Throughput properties of fair policies in ring networks . . . . . . . . . . . . 718--728 Frank Y. S. Lin Link set sizing for networks supporting SMDS . . . . . . . . . . . . . . . . . . 729--739 Thomas F. La Porta and Mischa Schwartz Performance analysis of MSP: feature-rich high-speed transport protocol . . . . . . . . . . . . . . . . 740--753
Will E. Leland and Murad S. Taqqu and Walter Willinger and Daniel V. Wilson On the self-similar nature of Ethernet traffic (extended version) . . . . . . . 1--15 A. J. McAuley Weighted sum codes for error detection and their comparison with existing codes 16--22 Imrich Chlamtac and András Faragó Making transmission schedules immune to topology changes in multi-hop packet radio networks . . . . . . . . . . . . . 23--29 Zsehong Tsai and Wen-der Wang and Chien-Hwa Chiou and Jin-Fu Chang and Lung-Sing Liang Performance analysis of two echo control designs in ATM networks . . . . . . . . 30--39 Tsong-Ho Wu A passive protected self-healing mesh network architecture and applications 40--52 Hong-Dah Sheng and San-Qi Li Spectral analysis of packet loss rate at a statistical multiplexer for multimedia services . . . . . . . . . . . . . . . . 53--65 Gerard Tel and Ephraim Korach and Shmuel Zaks Synchronizing ABD networks . . . . . . . 66--69 Kumar N. Sivarajan and Rajiv Ramaswami Lightwave networks based on de Bruijn graphs . . . . . . . . . . . . . . . . . 70--79 Jane M. Simmons and Robert G. Gallager Design of error detection scheme for class C service in ATM . . . . . . . . . 80--88 Oran Sharon and Adrian Segall On the efficiency of slot reuse in the Dual Bus configuration . . . . . . . . . 89--100
Gerard R. Pieris and Galen H. Sasaki Scheduling transmissions in WDM broadcast-and-select networks . . . . . 105--110 Julio Escobar and Craig Partridge and Debra Deutsch Flow synchronization protocol . . . . . 111--121 Sally Floyd and Van Jacobson The synchronization of periodic routing messages . . . . . . . . . . . . . . . . 122--136 Abhay K. Parekh and Robert G. Gallagher A generalized processor sharing approach to flow control in integrated services networks: the multiple node case . . . . 137--150 Marco Ajmone Marsan and Andrea Bianco and Luigi Ciminiera and Riccardo Sisto and Adriano Valenzano A LOTOS extension for the performance analysis of distributed systems . . . . 151--165 Chung-Ju Chang and Tian-Tsair Su and Yueh-Yiing Chiang Analysis of a cutoff priority cellular radio system with finite queueing and reneging/dropping . . . . . . . . . . . 166--175 David M. Lucantoni and Marcel F. Neuts and Amy R. Reibman Methods for performance evaluation of VBR video traffic models . . . . . . . . 176--180 Daniel S. Omundsen and A. Roger Kaye and Samy A. Mahmoud A pipelined, multiprocessor architecture for a connectionless server for broadband ISDN . . . . . . . . . . . . . 181--192 George W. Hart and Samir G. Kelekar Automated repair of complex systems by fault compensation . . . . . . . . . . . 193--205 Seung Ho Hong Approximate analysis of timer-controlled priority scheme in the single-service token-passing systems . . . . . . . . . 206--215
Aura Ganz and Xudong Wang Efficient algorithm for virtual topology design in multihop lightwave networks 217--225 Inder Gopal and Roch Guérin Network transparency: the plaNET approach . . . . . . . . . . . . . . . . 226--239 Israel Cidon and Roch Guérin and Asad Khamisy On protective buffer policies . . . . . 240--246 Piera Barcaccia and Maurizio A. Bonuccelli Polynomial time optimal algorithms for time slot assignment of variable bandwidth systems . . . . . . . . . . . 247--251 Dragomir D. Dimitrijevic and Basil Maglaris and Robert R. Boorstyn Routing in multidomain networks . . . . 252--262 Reuven Cohen ``Session swapping'': a new approach for optimal bandwidth sharing of ring circuit switched channels . . . . . . . 263--268 Oran Sharon and Adrian Segall Schemes for slot reuse in CRMA . . . . . 269--278 Terence D. Todd The token grid network . . . . . . . . . 279--287 Jae W. Byun and Tony T. Lee The design and analysis of an ATM multicast switch with adaptive traffic controller . . . . . . . . . . . . . . . 288--298 Emmanouel A. Varvarigos and Dimitri P. Bertsekas Performance of hypercube routing schemes with or without buffering . . . . . . . 299--311
Vern Paxson Empirically derived analytic models of wide-area TCP connections . . . . . . . 316--336 Allen R. and J. r. Bonde and Sumit Ghosh A comparative study of fuzzy versus ``fixed'' thresholds for robust queue management in cell-switching networks 337--344 Philip P. To and Tak-Shing P. Yum and Yiu-Wing Leung Multistar implementation of expandable shufflenets . . . . . . . . . . . . . . 345--351 Martina Zitterbart and Ahmed N. Tantawy and Dimitrios N. Serpanos A high performance transparent bridge 352--362 Jon M. Peha and Fouad A. Tobagi Analyzing the fault tolerance of double-loop networks . . . . . . . . . . 363--373 Leandros Tassiulas and Yao Chung Hung and Shivendra S. Panwar Optimal buffer control during congestion in an ATM network node . . . . . . . . . 374--386 Catherine Rosenberg and Bruno Laguë A heuristic framework for source policing in ATM networks . . . . . . . . 387--397 Stefano Gianatti and Achille Pattavina Performance analysis of ATM Banyan networks with shared queueing --- part I: random offered traffic . . . . . . . 398--410 Achille Pattavina and Stefano Gianatti Performance analysis of ATM Banyan networks with shared queueing --- part II: correlated/unbalanced offered traffic . . . . . . . . . . . . . . . . 411--424
Michael F. Schwartz and Calton Pu Applying an information gathering architecture to Netfind: a white pages tool for a changing and growing Internet 426--439 Paul D. Amer and Christophe Chassot and Thomas J. Connolly and Michel Diaz and Phillip Conrad Partial-order transport service for multimedia and other applications . . . 440--456 Raymond E. Miller and Sanjoy Paul Structural analysis of protocol specifications and generation of maximal fault coverage conformance test sequences . . . . . . . . . . . . . . . 457--470 Richard O. LaMaire and Dimitrios N. Serpanos Two-dimensional round-robin schedulers for packet switches with multiple input queues . . . . . . . . . . . . . . . . . 471--482 Gilbert M. Lundy and H. Alphan Tipici Specification and analysis of the SNR high-speed transport protocol . . . . . 483--496 Tsern-Huei Lee and Jin-Jye Chou Diagnosis of single faults in bitonic sorters . . . . . . . . . . . . . . . . 497--507 Mohamed Abdelaziz and Ioannis Stavrakakis Some optimal traffic regulation schemes for ATM networks: a Markov decision approach . . . . . . . . . . . . . . . . 508--519 Dimitris Logothetis and Kishor S. Trivedi Reliability analysis of the double counter-rotating ring with concentrator attachments . . . . . . . . . . . . . . 520--532 James V. Luciani and C. Y. Roger Chen An analytical model for partially blocking finite-buffered switching networks . . . . . . . . . . . . . . . . 533--540 Reuven Cohen and Yoram Ofek Self-termination mechanism for label swapping routing . . . . . . . . . . . . 541--545
Yiu-Wing Leung and Tak-Shing Yum A modular multirate video distribution system: design and dimensioning . . . . 549--557 Debasis Mitra and John A. Morrison Erlang capacity and uniform approximations for shared unbuffered resources . . . . . . . . . . . . . . . 558--570 Hyong S. Kim Design and performance of Multinet switch: a multistage ATM switch architecture with partially shared buffers . . . . . . . . . . . . . . . . 571--580 Imrich Chlamtac and András Faragó and Tao Zhang Optimizing the system of virtual paths 581--587 Chun-Chong Huang and Alberto Leon-Garcia Separation principle of dynamic transmission and enqueueing priorities for real- and nonreal-time traffic in ATM multiplexers . . . . . . . . . . . . 588--601 Jacob Sharony The universality of multidimensional switching networks . . . . . . . . . . . 602--612
Michael P. Rumsewicz and Donald E. Smith A comparison of SS7 congestion control options during mass call-in situations 1--9 San-Qi Li and Song Chong and Chia-Lin Hwang Link capacity allocation and network control by filtered input rate in high-speed networks . . . . . . . . . . 10--25 Wei-Tsong Lee and Ling-Yang Kung Binary addressing and routing schemes in the Manhattan street network . . . . . . 26--30 Ray Bird and Inder Gopal and Amir Herzberg and Phil Janson and Shay Kutten and Refik Molva and Moti Yung The KryptoKnight family of light-weight protocols for authentication and key distribution . . . . . . . . . . . . . . 31--41 Judah Levine An algorithm to synchronize the time of a computer to universal time . . . . . . 42--50 Thomas Gutekunst and Daniel Bauer and Germano Caronni and Bernhard Plattner and Hasan A distributed and policy-free general-purpose shared window system . . 51--62 P. C. Wong and M. S. Yeung Design and analysis of a novel fast packet switch: pipeline Banyan . . . . . 63--69 Jeong Gyu Lee and Byeong Gi Lee A new distribution network based on controlled switching elements and its applications . . . . . . . . . . . . . . 70--81 Zhen Liu and Don Towsley Burst reduction properties of rate-control throttles: downstream queue behavior . . . . . . . . . . . . . . . . 82--90 Christopher Ward and Cheong H. Choi and Thomas F. Hain A data link control protocol for LEO satellite networks providing a reliable datagram service . . . . . . . . . . . . 91--103
Paul Barker An analysis of user input to an X.500 white pages directory service . . . . . 112--125 H. Jonathan Chao and Byeong-Seog Choe Design and analysis of a large-scale multicast output buffered ATM switch . . 126--138 Hyong W. Lee and Jon W. Mark Capacity allocation in statistical multiplexing of ATM sources . . . . . . 139--151 Wen-Huei Chen and Hasan Ural Synchronizable test sequences based on multiple UIO sequences . . . . . . . . . 152--157 David A. Levine and Ian F. Akyildiz PROTON: a media access control protocol for optical networks with star topology 158--168 Yoram Ofek and Moti Yung METANET: principles of an arbitrary topology LAN . . . . . . . . . . . . . . 169--180 P. S. Min and H. Saidi and M. V. Hegde A nonblocking architecture for broadband multichannel switching . . . . . . . . . 181--198 Myung J. Lee and David S. Ahn Cell loss analysis and design trade-offs of nonblocking ATM switches with nonuniform traffic . . . . . . . . . . . 199--210 George N. Rouskas and Mostafa H. Ammar Analysis and optimization of transmission schedules for single-hop WDM networks . . . . . . . . . . . . . . 211--221 Peter Farka\us Comments on ``Weighted sum codes for error detection and their comparison with existing codes'' . . . . . . . . . 222--223
Vern Paxson and Sally Floyd Wide area traffic: the failure of Poisson modeling . . . . . . . . . . . . 226--244 David L. Mills Improved algorithms for synchronizing computer network clocks . . . . . . . . 245--254 A. Udaya Shankar and David Lee Minimum-latency transport protocols with modulo-$N$ . . . . . . . . . . . . . . . 255--268 Rajesh K. Pankaj and Robert G. Gallager Wavelength requirements of all-optical networks . . . . . . . . . . . . . . . . 269--280 Zhensheng Zhang and Anthony S. Acampora A heuristic wavelength assignment algorithm for multihop WDM networks with wavelength routing and wavelength re-use 281--288 H. Saidi and P. S. Min and M. V. Hegde A new structural property of statistical data forks . . . . . . . . . . . . . . . 289--298 Xi-Ren Cao and Don Towsley A performance model for ATM switches with general packet length distributions 299--309 David McMillan Delay analysis of a cellular mobile priority queueing system . . . . . . . . 310--319 Reuven Cohen and Yoram Ofek and Adrian Segall A new label-based source routing for multi-ring networks . . . . . . . . . . 320--328 Amy R. Reibman and Arthur W. Berger Traffic descriptors for VBR video teleconferencing over ATM networks . . . 329--339 Moncef Hamdaoui and Parameswaran Ramanathan Selection of timed token protocol parameters to guarantee message deadlines . . . . . . . . . . . . . . . 340--351 Chin-Tau Lea and Anwar Alyatama Bandwidth quantization and states reduction in the broadband ISDN . . . . 352--360
Sally Floyd and Van Jacobson Link-sharing and resource management models for packet networks . . . . . . . 365--386 Ellen Witte Zegura Evaluating blocking probability in generalized connectors . . . . . . . . . 387--398 Norival R. Figueira and Joseph Pasquale An upper bound on delay for the VirtualClock service discipline . . . . 399--408 Kjersti Moldeklev and Per Gunningberg How a large ATM MTU causes deadlocks in TCP data transfers . . . . . . . . . . . 409--422 Takis Konstantopoulos and Venkat Anantharam Optimal flow control schemes that regulate the burstiness of traffic . . . 423--432 Guang-Liang Li and Patrick W. Dowd An analysis of network performance degradation induced by workload fluctuations . . . . . . . . . . . . . . 433--440 Alan A. Bertossi and Maurizio A. Bonuccelli Code assignment for hidden terminal interference avoidance in multihop packet radio networks . . . . . . . . . 441--449 Kyeong Soo Kim and Byeong Gi Lee Three-level traffic shaper and its application to source clock frequency recovery for VBR services in ATM networks . . . . . . . . . . . . . . . . 450--458 Krishna Bala and Thomas E. Stern and David Simchi-Levi and Kavita Bala Routing in a linear lightwave network 459--469 Jason Iness and Subrata Banerjee and Biswanath Mukherjee GEMNET: a generalized, shuffle-exchange-based, regular, scalable, modular, multihop, WDM lightwave network . . . . . . . . . . . 470--476 Feiling Jia and Biswanath Mukherjee and Jason Iness Scheduling variable-length messages in a single-hop multichannel local lightwave network . . . . . . . . . . . . . . . . 477--488
Rajiv Ramaswami and Kumar N. Sivarajan Routing and wavelength assignment in all-optical networks . . . . . . . . . . 489--500 Amit Gupta and Domenico Ferrari Resource partitioning for real-time communication . . . . . . . . . . . . . 501--508 Joseph Bannister and Flaminio Borgonovo and Luigi Fratta and Mario Gerla A performance model of deflection routing in multibuffer networks with nonuniform traffic . . . . . . . . . . . 509--520 Arif Merchant and Bhaskar Sengupta Assignment of cells to switches in PCS networks . . . . . . . . . . . . . . . . 521--526 Krishnan Padmanabhan An efficient architecture for fault-tolerant ATM switches . . . . . . 527--537 Donald E. Smith Ensuring robust call throughput and fairness for SCP overload controls . . . 538--548 Ming H. Chan and John P. Princen Prioritized statistical multiplexing of PCM sources . . . . . . . . . . . . . . 549--559 Edmundo de Souza e. Silva and H. Richard Gail and Richard R. Muntz Polling systems with server timeouts and their application to token passing networks . . . . . . . . . . . . . . . . 560--575 Leandros Tassiulas and Jinoo Joung Performance measures and scheduling policies in ring networks . . . . . . . 576--584 Gagan L. Choudhury and Kin K. Leung and Ward Whitt An inversion algorithm to compute blocking probabilities in loss networks with state-dependent rates . . . . . . . 585--601 Sem C. Borst and Onno J. Boxma and Hanoch Levy The use of service limits for efficient operation of multistation single-medium communication systems . . . . . . . . . 602--612 Whay Chiou Lee and Pierre A. Humblet Space-time characteristics of ALOHA protocols in high-speed bidirectional bus networks . . . . . . . . . . . . . . 613--622
Ren-Hung Hwang and James F. Kurose and Don Towsley On-call processing delay in high speed networks . . . . . . . . . . . . . . . . 628--639 David C. Feldmeier Fast software implementation of error detection codes . . . . . . . . . . . . 640--651 H. Jonathan Chao and Necdet Uzun An ATM queue manager handling multiple delay and loss priorities . . . . . . . 652--659 Guo-Liang Wu and Jon W. Mark A buffer allocation scheme for ATM networks: complete sharing based on virtual partition . . . . . . . . . . . 660--670 Hemant Kanakia and Partho P. Mishra and Amy R. Reibman An adaptive congestion control scheme for real time packet video transport . . 671--682 Geoffrey G. Xie and Simon S. Lam Delay guarantee of virtual clock server 683--689 Jianxu Shi and John P. Fonseka Hierarchical self-healing rings . . . . 690--697 Upamanyu Madhow and Michael L. Honig and Kenneth Steiglitz Optimization of wireless resources for personal communications mobility tracking . . . . . . . . . . . . . . . . 698--707 C. Y. Roger Chen and Shuo-Hsien Hsiao and Abdulaziz S. Almazyad A new model for the performance evaluation of synchronous circuit switched multistage interconnection networks . . . . . . . . . . . . . . . . 708--715 Dipak Ghosal and T. V. Lakshman and Yennun Huang Parallel architectures for processing high speed network signaling protocols 716--728 Sijing Zhang and Alan Burns An optimal synchronous bandwidth allocation scheme for guaranteeing synchronous message deadlines with the timed-token MAC protocol . . . . . . . . 729--741 Dong Guen Jeong and Chong-Ho Choi and Wha Sook Jeon Design and performance evaluation of a new medium access control protocol for local wireless data communications . . . 742--752 Irene Katzela and Mischa Schwartz Schemes for fault identification in communication networks . . . . . . . . . 753--764 Gregory P. Pollini and Kathleen S. Meier-Hellstern Efficient routing of information between interconnected cellular mobile switching centers . . . . . . . . . . . . . . . . 765--774 Meir Herzberg and Stephen J. Bye and Anthony Utano The hop-limit approach for spare-capacity assignment in survivable networks . . . . . . . . . . . . . . . . 775--784 Ikhlaq Sidhu and Scott Jordan Multiplexing gains in bit stream multiplexors . . . . . . . . . . . . . . 785--797 Donald E. Smith and H. Jonathan Chao Sizing a packet reassembly buffer at a host computer in an ATM network . . . . 798--808 D. Medhi Multi-hour, multi-traffic class network design for virtual path-based dynamically reconfigurable wide-area ATM networks . . . . . . . . . . . . . . . . 809--818 Scott J. Shenker Making greed work in networks: a game-theoretic analysis of switch service disciplines . . . . . . . . . . 819--831 Matteo D'Ambrosio and Riccardo Melen Evaluating the limit behavior of the ATM traffic within a network . . . . . . . . 832--841 Izhak Rubin and James Chien-Hsing Wu Analysis of an M/G/1/N queue with vacations and its iterative application to FDDI timed-token rings . . . . . . . 842--856 Paul S. Min and Manjunath V. Hegde and Hossein Saidi and Alex Chandra Nonblocking copy networks in multi-channel switching . . . . . . . . 857--871 C. Y. Roger Chen and Georges A. Makhoul and Dikran S. Meliksetian A queueing analysis of the performance of DQDB . . . . . . . . . . . . . . . . 872--881
Anindo Banerjea and Domenico Ferrari and Bruce A. Mah and Mark Moran and Dinesh C. Verma and Hui Zhang The Tenet real-time protocol suite: design, implementation, and experiences 1--10 R. L. Cruz and Jung-Tsung Tsai COD: alternative architectures for high speed packet switching . . . . . . . . . 11--21 Kazutaka Murakami and Hyong S. Kim Virtual path routing for survivable ATM networks . . . . . . . . . . . . . . . . 22--39 Daniel P. Heyman and T. V. Lakshman Source models for VBR broadcast-video traffic . . . . . . . . . . . . . . . . 40--48 Anthony Hung and George Kesidis Bandwidth scheduling for wide-area ATM networks using virtual finishing times 49--54 Stefan Leue and Philippe A. Oechslin On parallelizing and optimizing the implementation of communication protocols . . . . . . . . . . . . . . . 55--70 Dan Picker and Ronald D. Fellman and Paul M. Chau An extension to the SCI flow control protocol for increased network efficiency . . . . . . . . . . . . . . . 71--85 Willibald Doeringer and Günter Karjoth and Mehdi Nassehi Routing on longest-matching prefixes . . 86--97 Daniel Chonghwan Lee Worst-case fraction of CBR teletraffic unpunctual due to statistical multiplexing . . . . . . . . . . . . . . 98--105 David M. Koppelman Congested Banyan network analysis using congested-queue states and neighboring-queue effects . . . . . . . 106--111 Zvi Rosberg Cell multiplexing in ATM networks . . . 112--122 Zbigniew Dziong and Lorne G. Mason Fair-efficient call admission control policies for broadband networks --- a game theoretic framework . . . . . . . . 123--136
Girish P. Chandranmenon and George Varghese Trading packet headers for packet processing . . . . . . . . . . . . . . . 141--152 Stephen Deering and Deborah L. Estrin and Dino Farinacci and Van Jacobson and Ching-Gung Liu and Liming Wei The PIM architecture for wide-area multicast routing . . . . . . . . . . . 153--162 Hua Jiang and Stephen S. Rappaport Prioritized channel borrowing without locking: a channel sharing strategy for cellular communications . . . . . . . . 163--172 Panagiotis N. Zarros and Myung J. Lee and Tarek N. Saadawi Interparticipant synchronization in real-time multimedia conferencing using feedback . . . . . . . . . . . . . . . . 173--180 Fred Bauer and Anujan Varma Distributed algorithms for multicast path setup in data networks . . . . . . 181--191 Hong Liu and Raymond E. Miller Generalized fair reachability analysis for cyclic protocols . . . . . . . . . . 192--204 Leandros Tassiulas and Leonidas Georgiadis Any work-conserving policy stabilizes the ring with spatial re-use . . . . . . 205--208 Ashok Erramilli and Onuttom Narayan and Walter Willinger Experimental queueing analysis with long-range dependent packet traffic . . 209--223 Partho Pratim Mishra and Hemant Kanakia and Satish K. Tripathi On hop-by-hop rate-based congestion control . . . . . . . . . . . . . . . . 224--239 Hongbo Zho and Victor S. Frost In-service monitoring for cell loss quality of service violations in ATM networks . . . . . . . . . . . . . . . . 240--248 Dominique Ga\"\iti and Guy Pujolle Performance management issues in ATM networks: traffic and congestion control 249--257 Lillykutty Jacob and Anurag Kumar Delay performance of some scheduling strategies in an input queuing ATM switch with multiclass bursty traffic 258--271 Andrea E. F. Clementi and Miriam Di Ianni On the hardness of approximating optimum schedule problems in store and forward networks . . . . . . . . . . . . . . . . 272--280 Fotios K. Liotopoulos and Suresh Chalasani Semi-rearrangeably nonblocking operation of Clos networks in the multirate environment . . . . . . . . . . . . . . 281--291 Eitan Altman and Daniel Kofman Bounds for performance measures of token rings . . . . . . . . . . . . . . . . . 292--299
Daniel P. Heyman and T. V. Lakshman What are the implications of long-range dependence for VBR-video traffic engineering? . . . . . . . . . . . . . . 301--317 Torsten Braun and Christophe Diot Performance evaluation and cache analysis of an ILP protocol implementation . . . . . . . . . . . . . 318--330 Mete Kabatepe and Kenneth S. Vastola The fair distributed queue (FDQ) protocol for high-speed metropolitan-area networks . . . . . . . 331--339 Thierry Turletti and Christian Huitema Videoconferencing on the Internet . . . 340--351 Dallas E. Wrege and Edward W. Knightly and Hui Zhang and Jörg Liebeherr Deterministic delay bounds for VBR video in packet-switching networks: fundamental limits and practical trade-offs . . . . . . . . . . . . . . . 352--362 Reuven Cohen and Baiju V. Patel and Frank Schaffa and Marc Willebeek-LeMair The sink tree paradigm: connectionless traffic support on ATM LAN's . . . . . . 363--374 M. Shreedhar and George Varghese Efficient fair queueing using deficit round-robin . . . . . . . . . . . . . . 375--385 Guo-Liang Wu and Jon W. Mark Computational methods for performance evaluation of a statistical multiplexer supporting bursty traffic . . . . . . . 386--397 Leandros Tassiulas Push forward link-level scheduling for network-wide performance . . . . . . . . 398--406 Georgios I. Papadimitriou and Dimitris G. Maritsas Learning automata-based receiver conflict avoidance algorithms for WDM broadcast-and-select star networks . . . 407--412 Sassan Pejhan and Mischa Schwartz and Dimitris Anastassiou Error control using retransmission schemes in multicast transport protocols for real-time media . . . . . . . . . . 413--427 Manjari Asawa and Wayne E. Stark Optimal scheduling of handoffs in cellular networks . . . . . . . . . . . 428--441 Yitzhak Birk and Noam Bloch The effects of destructive interference and wasted transmissions on the uniform-traffic capacity of non-bus-oriented single-hop interconnections . . . . . . . . . . . . 442--448 Vincenzo Catania and Giuseppe Ficili and Sergio Palazzo and Daniela Panno A comparative analysis of fuzzy versus conventional policing mechanisms for ATM networks . . . . . . . . . . . . . . . . 449--459 Ray-Guang Cheng and Chung-Ju Chang Design of a fuzzy traffic controller for ATM networks . . . . . . . . . . . . . . 460--469 Jacek \'Swiderski Approximate performance analysis of real-time traffic over heavily loaded networks with timed token protocols . . 470--478
Leonidas Georgiadis and Roch Guérin and Vinod Peris and Kumar N. Sivarajan Efficient network QoS provisioning based on per node traffic shaping . . . . . . 482--501 R. Ahuja and S. Keshav and H. Saran Design, implementation, and performance measurement of a native-mode ATM transport layer (extended version) . . . 502--515 James D. Salehi and James F. Kurose and Don Towsley The effectiveness of affinity-based scheduling in multiprocessor network protocol processing (extended version) 516--530 Debasis Mitra and John A. Morrison and K. G. Ramakrishnan ATM network design and optimization: a multirate loss network framework . . . . 531--543 Suresh Subramaniam and Murat Azizo\uglu and Arun K. Somani All-optical networks with sparse wavelength conversion . . . . . . . . . 544--557 S. Ramanathan Multicast tree generation in networks with asymmetric links . . . . . . . . . 558--568 Anna Charny and K. K. Ramakrishnan and Anthony Lauck Time scale analysis scalability issues for explicit rate allocation in ATM networks . . . . . . . . . . . . . . . . 569--581 Israel Zibman and Carl Woolf and Peter O'Reilly and Larry Strickland and David Willis and John Visser An architectural approach to minimizing feature interactions in telecommunications . . . . . . . . . . . 582--596 William S. Marcus An architecture for QoS analysis and experimentation . . . . . . . . . . . . 597--603 Peter J. Smith and Mansoor Shafi The impact of G.826 on the performance of transport systems . . . . . . . . . . 604--614 Pratyush Moghé and Izhak Rubin Enhanced call: a paradigm for applications with dynamic client-membership and client-level binding in ATM networks . . . . . . . . 615--628 Ian F. Akyildiz and Joseph S. M. Ho and Yi-Bing Lin Movement-based location update and selective paging for PCS networks . . . 629--638 Eytan Modiano and Anthony Ephremides Efficient algorithms for performing packet broadcasts in a mesh network . . 639--648 Izhak Rubin and Ho-Ting Wu Performance analysis and design of CQBT algorithm for a ring network with spatial reuse . . . . . . . . . . . . . 649--659 András L. Oláh and Sonia M. Heemstra de Groot Comments on ``Minimum-latency transport protocols with modulo-$N$'' . . . . . . 660--666
Fengmin Gong and Gurudatta M. Parulkar An application-oriented error control scheme for high-speed networks . . . . . 669--683 Biswanath Mukherjee and Dhritiman Banerjee and S. Ramamurthy and Amarnath Mukherjee Some principles for designing a wide-area WDM optical network . . . . . 684--696 Simon S. Lam and Simon Chow and David K. Y. Yau A lossless smoothing algorithm for compressed video . . . . . . . . . . . . 697--708 Joseph S. M. Ho and Ian F. Akyildiz Local anchor scheme for reducing signaling costs in personal communications networks . . . . . . . . 709--725 Alberto Bononi and Paul R. Prucnal Analytical evaluation of improved access techniques in deflection routing networks . . . . . . . . . . . . . . . . 726--730 Kenneth J. Schultz and P. Glenn Gulak Multicast contention resolution with single-cycle windowing using content addressable FIFO's . . . . . . . . . . . 731--742 Jong Suk Ahn and Peter B. Danzig Packet network simulation: speedup and accuracy versus timing granularity . . . 743--757 Tsern-Huei Lee and Kuen-Chu Lai and Shii-Tyng Duann Design of a real-time call admission controller for ATM networks . . . . . . 758--765 Reuven Elbaum and Moshe Sidi Topological design of local-area networks using genetic algorithms . . . 766--778 Bhagirath Narahari and Sunil Shende and Rahul Simha Efficient algorithms for erasure node placement on slotted dual bus networks 779--784 Anjali Agarwal and J. William Atwood A unified approach to fault-tolerance in communication protocols based on recovery procedures . . . . . . . . . . 785--795 Cesar Vargas and Manjunath V. Hegde and Morteza Naraghi-Pour and Paul S. Min Shadow prices for LLR and ALBA . . . . . 796--807
Steven H. Low and Nicholas F. Maxemchuk and Sanjoy Paul Anonymous credit cards and their collusion analysis . . . . . . . . . . . 809--816 Jonathan Kay and Joseph Pasquale Profiling and reducing processing overheads in TCP/IP . . . . . . . . . . 817--828 Carey L. Williamson Dynamic bandwidth allocation using loss-load curves . . . . . . . . . . . . 829--839 Thomas F. La Porta and Malathi Veeraraghavan and Richard W. Buskens Comparison of signaling loads for PCS systems . . . . . . . . . . . . . . . . 840--856 Symeon Papavassiliou and Leandros Tassiulas Joint optimal channel base station and power assignment for wireless access . . 857--872 Ornan Gerstel and Israel Cidon and Shmuel Zaks The layout of virtual paths in ATM networks . . . . . . . . . . . . . . . . 873--884 Jörg Liebeherr and Dallas E. Wrege and Domenico Ferrari Exact admission control for networks with a bounded delay service . . . . . . 885--901 Hosame Abu-Amara and Brian A. Coan and Shlomi Dolev and Arkady Kanevsky and Jennifer L. Welch Self-stabilizing topology maintenance protocols for high-speed networks . . . 902--912 Hongsik Choi and Hyeong-Ah Choi and Murat Azizo\uglu Efficient scheduling of transmissions in optical broadcast networks . . . . . . . 913--920 Sung-hark Chung and Hu-gon Kim and Yong-seok Yoon and Dong-wan Tcha Cost-minimizing construction of a unidirectional SHR with diverse protection . . . . . . . . . . . . . . . 921--928 Ahmed E. Kamal Performance modeling of partial packet discarding using the end-of-packet indicator in AAL type 5 . . . . . . . . 929--940 Sridhar Ramesh and Catherine Rosenberg and Anurag Kumar Revenue maximization in ATM networks using the CLP capability and buffer priority management . . . . . . . . . . 941--950 Olaf Henniger and Michel Barbeau and Behçet Sarikaya Specification and testing of the behavior of network management agents using SDL-92 . . . . . . . . . . . . . . 951--962
David A. Levine and Ian F. Akyildiz and Mahmoud Naghshineh A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept . . . . . . . . . . . . . . . . 1--12 Chih-Lin I. and Gregory P. Pollini and Richard D. Gitlin PCS mobility management using the reverse virtual call setup algorithm . . 13--24 Yi-Bing Lin Reducing location update cost in a PCS network . . . . . . . . . . . . . . . . 25--33 Dong-wan Tcha and Yong-joo Chung and Taek-jin Choi A new lower bound for the frequency assignment problem . . . . . . . . . . . 34--39 Charles R. Kalmanek and Srinivasan Keshav and William T. Marshall and Samuel P. Morgan and Robert C. Restrick III Xunet 2: lessons from an early wide-area ATM testbed . . . . . . . . . . . . . . 40--55 Sugih Jamin and Peter B. Danzig and Scott J. Shenker and Lixia Zhang A measurement-based admission control algorithm for integrated service packet networks . . . . . . . . . . . . . . . . 56--70 Walter Willinger and Murad S. Taqqu and Robert Sherman and Daniel V. Wilson Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level . . . . . . . . . . . . . . . . . 71--86 Soung C. Liew On the stability of shuffle-exchange and bidirectional shuffle-exchange deflection networks . . . . . . . . . . 87--94 San-qi Li and Chia-lin Hwang On the convergence of traffic measurement and queueing analysis: a statistical-matching and queueing (SMAQ) tool . . . . . . . . . . . . . . . . . . 95--110 Yoram Ofek and Khosrow Sohraby and Ho-Ting Wu Integration of synchronous and asynchronous traffic on the MetaRing and its performance study . . . . . . . . . 111--121 Wassim Matragi and Khosrow Sohraby and Chatschik Bisdikian Jitter calculus in ATM networks: multiple nodes . . . . . . . . . . . . . 122--133 Zbigniew Dziong and Marek Juda and Lorne G. Mason A framework for bandwidth management in ATM networks --- aggregate equivalent bandwidth estimation approach . . . . . 134--147 J. J. Garcia-Luna-Aceves and Shree Murthy A path-finding algorithm for loop-free routing . . . . . . . . . . . . . . . . 148--160 Yannis A. Korilis and Aurel A. Lazar and Ariel Orda Achieving network optima using Stackelberg routing strategies . . . . . 161--173
Terence D. Todd and Ellen L. Hahne Multi-access mesh (multimesh) networks 181--189 Israel Cidon and Leonidas Georgiadis and Roch Guérin and Yuval Shavitt Improved fairness algorithms for rings with spatial reuse . . . . . . . . . . . 190--204 Simon S. Lam and Geoffrey G. Xie Group priority scheduling . . . . . . . 205--218 Edward W. Knightly and Hui Zhang D-BIND: an accurate traffic model for providing QoS guarantees to VBR traffic 219--231 Norival R. Figueira and Joseph Pasquale A schedulability condition for deadline-ordered service disciplines . . 232--244 John M. Spinelli Self-stabilizing sliding window ARQ protocols . . . . . . . . . . . . . . . 245--254 Michael Andersin and Jens Zander and Zvi Rosberg Soft and safe admission control in cellular networks . . . . . . . . . . . 255--265 Albert G. Greenberg and R. Srikant Computational techniques for accurate performance evaluation of multirate, multihop communication networks . . . . 266--277 Hiroyuki Ohsaki and Naoki Wakamiya and Masayuki Murata and Hideo Miyahara Performance of an input/output buffered-type ATM LAN switch with back-pressure function . . . . . . . . . 278--290 Raffaele Bolla and Franco Davoli Control of multirate synchronous streams in hybrid TDM access networks . . . . . 291--304 Joel E. Cohen and Clark Jeffries Congestion resulting from increased capacity in single-server queueing networks . . . . . . . . . . . . . . . . 305--310 Marc Willebeek-LeMair and Perwez Shahabuddin Approximating dependability measures of computer networks: an FDDI case study 311--327
Fabrizio Sestini Recursive copy generation for multicast ATM switching . . . . . . . . . . . . . 329--335 T. V. Lakshman and Upamanyu Madhow The performance of TCP/IP for networks with high bandwidth-delay products and random loss . . . . . . . . . . . . . . 336--350 Jean-François P. Labourdette Performance impact of partial reconfiguration on multihop lightwave networks . . . . . . . . . . . . . . . . 351--358 George N. Rouskas and Vijay Sivaraman Packet scheduling in broadcast WDM networks with arbitrary transceiver tuning latencies . . . . . . . . . . . . 359--370 Bhargav R. Bellur and Galen H. Sasaki A SAT-based network access scheme for fairness in high speed networks . . . . 371--381 Wing-cheong Lau and San-qi Li Statistical multiplexing and buffer sharing in multimedia high-speed networks: a frequency-domain perspective 382--396 Boris Tsybakov and Nicoals D. Georganas On self-similar traffic in ATM queues: definitions, overflow probability bound, and cell delay distribution . . . . . . 397--409 Oran Sharon A proof for lack of starvation in DQDB with and without slot reuse . . . . . . 410--420 George M. Stamatelos and Vassilios N. Koukoulidis Reservation-based bandwidth allocation in a radio ATM network . . . . . . . . . 420--428 San-qi Li and James D. Pruneski The linearity of low frequency traffic flow: an intrinsic I/O property in queueing systems . . . . . . . . . . . . 429--443
Bobby Krupczak and Kenneth L. Calvert and Mostafa H. Ammar Increasing the portability and re-usability of protocol code . . . . . 445--459 Deborah A. Wallach and Dawson R. Engler and M. Frans Kaashoek ASHs: application-specific handlers for high-performance messaging . . . . . . . 460--474 David K. Y. Yau and Simon S. Lam Adaptive rate-controlled scheduling for multimedia applications . . . . . . . . 475--488 Thomas F. La Porta and Kuo-Wei Herman Chen A direct signaling system for flexible access and deployment of telecommunication services . . . . . . . 489--501 Duke Tantiprasut and John Neil and Craig Farrell ASN.1 protocol specification for use with arbitrary encoding schemes . . . . 502--513 Claude Castelluccia and Walid Dabbous and Sean O'Malley Generating efficient protocol code from an abstract specification . . . . . . . 514--524 András L. Oláh and Sonia M. Heemstra de Groot Alternative specification and verification of a periodic state exchange protocol . . . . . . . . . . . 525--529 Bülent Yener and Spyridon Matsoukas and Yoram Ofek Iterative approach to optimizing convergence routing priorities . . . . . 530--542 Randall Landry and Ioannis Stavrakakis Study of delay jitter with and without peak rate enforcement . . . . . . . . . 543--553 Daniel P. Heyman The GBAR source model for VBR videoconferences . . . . . . . . . . . . 554--560 Pawan Goyal and Harrick M. Vin Generalized guaranteed rate scheduling algorithms: a framework . . . . . . . . 561--571 Brahim Bensaou and Shirley T. C. Lam and Hon-Wai Chu and Danny H. K. Tsang Estimation of the cell loss ratio in ATM networks with a fuzzy system and application to measurement-based call admission control . . . . . . . . . . . 572--584 Kshirasagar Naik Efficient computation of unique input/output sequences in finite-state machines . . . . . . . . . . . . . . . . 585--599 Willibald Doeringer and Günter Karjoth and Mehdi Nassehi Corrections to ``Routing on longest-matching prefixes'' . . . . . . 600--600
Vern Paxson End-to-end routing behavior in the Internet . . . . . . . . . . . . . . . . 601--615 John Heidemann and Katia Obraczka and Joe Touch Modeling the performance of HTTP over several transport protocols . . . . . . 616--630 Martin F. Arlitt and Carey L. Williamson Internet Web servers: workload characterization and performance implications . . . . . . . . . . . . . . 631--645 Joseph S. M. Ho and Ian F. Akyildiz Dynamic hierarchical database architecture for location management in PCS networks . . . . . . . . . . . . . . 646--660 Jorge A. Cobb and Mohamed G. Gouda Flow theory . . . . . . . . . . . . . . 661--674 Jon C. R. Bennett and Hui Zhang Hierarchical packet fair queueing algorithms . . . . . . . . . . . . . . . 675--689 Pawan Goyal and Harrick M. Vin and Haichen Cheng Start-time fair queueing: a scheduling algorithm for integrated services packet switching networks . . . . . . . . . . . 690--704 Emmanouel A. Varvarigos and Vishal Sharma The ready-to-go virtual circuit protocol: a loss-free protocol for multigigabit networks using FIFO buffers 705--718 Srini B. Tridandapani and Biswanath Mukherjee and Geir Hallingstad Channel sharing in multi-hop WDM lightwave networks: do we need more channels? . . . . . . . . . . . . . . . 719--727 Abhijit K. Choudhury and Ellen L. Hahne A new buffer management scheme for hierarchical shared memory switches . . 728--738
Matthias Grossglauser and Srinivasan Keshav and David N. C. Tse RCBR: a simple and efficient service for multiple time-scale traffic . . . . . . 741--755 Hari Balakrishnan and Venkata N. Padmanabhan and Srinivasan Seshan and Randy H. Katz A comparison of mechanisms for improving TCP performance over wireless links . . 756--769 Ellen W. Zegura and Kenneth L. Calvert and Michael J. Donahoo A quantitative comparison of graph-based models for Internet topology . . . . . . 770--783 Sally Floyd and Van Jacobson and Ching-Gung Liu and Steven McCanne and Lixia Zhang A reliable multicast framework for light-weight sessions and application level framing . . . . . . . . . . . . . 784--803 Imrich Chlamtac and András Faragó and Hongbiao Zhang Time-spread multiple-access (TSMA) protocols for multihop mobile radio networks . . . . . . . . . . . . . . . . 804--812 Timothy Weller and Bruce Hajek Scheduling nonuniform traffic in a packet-switching system with small propagation delay . . . . . . . . . . . 813--823 George Varghese and Anthony Lauck Hashed and hierarchical timing wheels: efficient data structures for implementing a timer facility . . . . . 824--834 Mark E. Crovella and Azer Bestavros Self-similarity in World Wide Web traffic: evidence and possible causes 835--846 Shai Herzog and Scott Shenker and Deborah Estrin Sharing the ``cost'' of multicast trees: an axiomatic analysis . . . . . . . . . 847--860 Aurel A. Lazar and Ariel Orda and Dimitrios E. Pendarakis Virtual path bandwidth allocation in multiuser networks . . . . . . . . . . . 861--871 John O. Limb and Dolors Sala A protocol for efficient transfer of data over hybrid fiber/coax systems . . 872--881 Giuseppe Bianchi and Riccardo Melen The role of local storage in supporting video retrieval services on ATM networks 882--892 Yuguang Fang and Imrich Chlamtac and Yi-Bing Lin Modeling PCS networks under general call holding time and cell residence time distributions . . . . . . . . . . . . . 893--906 Partha P. Bhattacharya and Leonidas Georgiadis and Arvind Krishna Distributed channel allocation for PCN with variable rate traffic . . . . . . . 907--923 Ramaswamy Murali and Brian L. Hughes Random access with large propagation delay . . . . . . . . . . . . . . . . . 924--935 Rajiv Ramaswami and Adrian Segall Distributed network control for optical networks . . . . . . . . . . . . . . . . 936--943 D. Medhi and Sujit Guptan Network dimensioning and performance of multiservice, multirate loss networks with dynamic routing . . . . . . . . . . 944--957 Alfio Lombardo and Giovanni Schembra An analytical paradigm to compare routing strategies in an ATM multimedia environment . . . . . . . . . . . . . . 958--969 Rauf Izmailov and Duan-Shin Lee and Bhaskar Sengupta Design and analysis of a congestion-free overlay on a high-speed network . . . . 970--980 M. H. MacGregor and Wayne D. Grover Distributed partial-express routing of broad-band transport network demands . . 981--988 Bülent Yener and Yoram Ofek and Moti Yung Combinatorial design of congestion-free networks . . . . . . . . . . . . . . . . 989--1000
David G. Thaler and Chinya V. Ravishankar Using name-based mappings to increase hit rates . . . . . . . . . . . . . . . 1--14 Reuven Cohen and Srinivas Ramanathan TCP for high performance in hybrid fiber coaxial broad-band access networks . . . 15--29 Geoffrey G. Xie and Simon S. Lam Real-time block transfer under a link-sharing hierarchy . . . . . . . . . 30--41 Soung C. Liew and Derek Chi-yin Tse A control-theoretic approach to adapting VBR compressed video for transport over a CBR communications channel . . . . . . 42--55 Sudhir S. Dixit and Sharad Kumar Traffic descriptor mapping and traffic control for frame relay over ATM network 56--70 Bruce S. Northcote and Donald E. Smith Service control point overload rules to protect intelligent network services . . 71--81 Andre Girard and Brunilde Sansó Multicommodity flow models, failure propagation, and reliable loss network design . . . . . . . . . . . . . . . . . 82--93 K. Ravindran and Ting-Jian Gong Cost analysis of multicast transport architectures in multiservice networks 94--109
Peter Newman and Greg Minshall and Thomas L. Lyon IP switching --- ATM under IP . . . . . 117--129 Abhijit K. Choudhury and Ellen L. Hahne Dynamic queue length thresholds for shared-memory packet switches . . . . . 130--140 Aleksandr Privalov and Khosrow Sohraby Per-stream jitter analysis in CBR ATM multiplexors . . . . . . . . . . . . . . 141--149 Cathy A. Fulton and San-qi Li Delay jitter first-order and second-order statistical functions of general traffic on high-speed multimedia networks . . . . . . . . . . . . . . . . 150--163 Dimitrios Stiliadis and Anujan Varma Rate-proportional servers: a design methodology for fair queueing algorithms 164--174 Dimitrios Stiliadis and Anujan Varma Efficient fair queueing algorithms for packet-switched networks . . . . . . . . 175--185 Ezhan Karasan and Ender Ayanoglu Effects of wavelength routing and selection algorithms on wavelength conversion gain in WDM optical networks 186--196 Ahmed Mokhtar and Murat Azizo\uglu Adaptive wavelength routing in all-optical networks . . . . . . . . . . 197--206 Kazutaka Murakami and Hyong S. Kim Optimal capacity and flow assignment for self-healing ATM networks based on line and end-to-end restoration . . . . . . . 207--221 Nikolaos Anerousis and Aurel A. Lazar Virtual path control for ATM networks with call level quality of service guarantees . . . . . . . . . . . . . . . 222--236
Craig Partridge and Philip P. Carvey and Ed Burgess and Isidro Castineyra and Tom Clarke and Lise Graham and Michael Hathaway and Phil Herman and Allen King and Steve Kohalmi and Tracy Ma and John Mcallen and Trevor Mendez and Walter C. Milliken and Ronald Pettyjohn and John Rokosz and Joshua Seeger and Michael Sollins and Steve Storch and Benjamin Tober and Gregory D. Troxel A 50-Gb/s IP router . . . . . . . . . . 237--248 Ramachandran Ramjee and Thomas F. La Porta and Jim Kurose and Don Towsley Performance evaluation of connection rerouting schemes for ATM-based wireless networks . . . . . . . . . . . . . . . . 249--261 Mats Björkman and Per Gunningberg Performance modeling of multiprocessor implementations of protocols . . . . . . 262--273 Jorge A. Cobb and Mohamed G. Gouda and Amal El-Nahas Time-shift scheduling --- fair scheduling of flows in high-speed networks . . . . . . . . . . . . . . . . 274--285 Ehud Aharoni and Reuven Cohen Restricted dynamic Steiner trees for scalable multicast in datagram networks 286--297 Ji-Her Ju and Victor O. K. Li An optimal topology-transparent scheduling method in multihop packet radio networks . . . . . . . . . . . . . 298--306 Soung C. Liew and Ming-Hung Ng and Cathy W. Chan Blocking and nonblocking multirate Clos switching networks . . . . . . . . . . . 307--318 Kwan Lawrence Yeung and Tak-Shing Peter Yum Node placement optimization in ShuffleNets . . . . . . . . . . . . . . 319--324 Rainer R. Iraschko and M. H. MacGregor and Wayne D. Grover Optimal capacity placement for path restoration in STM or ATM mesh-survivable networks . . . . . . . . 325--336 B. Neelakantan and S. V. Raghavan Scientific foundations to the multilevel method . . . . . . . . . . . . . . . . . 337--346
Jörg Nonnenmacher and Ernst W. Biersack and Don Towsley Parity-based loss recovery for reliable multicast transmission . . . . . . . . . 349--361 David D. Clark and Wenjia Fang Explicit allocation of best-effort packet delivery service . . . . . . . . 362--373 R. Gopalakrishnan and Gurudatta M. Parulkar Efficient user-space protocol implementations with QoS guarantees using real-time upcalls . . . . . . . . 374--388 Philipp Hoschka Compact and efficient presentation conversion code . . . . . . . . . . . . 389--396 James D. Salehi and Shi-Li Zhang and Jim Kurose and Don Towsley Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing 397--410 Ness B. Shroff and Mischa Schwartz Improved loss calculations at an ATM multiplexer . . . . . . . . . . . . . . 411--421 Imrich Chlamtac and Hongbiao Zhang and András Faragó and Andrea Fumagalli A deterministic approach to the end-to-end analysis of packet flows in connection-oriented networks . . . . . . 422--431 Ornan Ori Gerstel and Israel Cidon and Shmuel Zaks Efficient support for client/server applications over heterogeneous ATM network . . . . . . . . . . . . . . . . 432--446 Arthur W. Berger and Ward Whitt Effective bandwidths with priorities . . 447--460 Mehrdad Parsa and Qing Zhu and J. J. Garcia-Luna-Aceves An iterative algorithm for delay-constrained minimum-cost multicasting . . . . . . . . . . . . . . 461--474 Nen-Fu Huang and Huey-Ing Liu A study of isochronous channel reuse in DQDB metropolitan area networks . . . . 475--484 Anurag Kumar Comparative performance analysis of versions of TCP in a local network with a lossy link . . . . . . . . . . . . . . 485--498 Tsern-Huei Lee and Kuen-Chu Lai Characterization of delay-sensitive traffic . . . . . . . . . . . . . . . . 499--504
David L. Mills Adaptive hybrid clock discipline algorithm for the network time protocol 505--514 Craig Labovitz and G. Robert Malan and Farnam Jahanian Internet routing instability . . . . . . 515--528 Jonathan Stone and Michael Greenwald and Craig Partridge and James Hughes Performance of checksums and CRC's over real data . . . . . . . . . . . . . . . 529--543 Hao Che and San-qi Li and Arthur Lin Adaptive resource management for flow-based IP/ATM hybrid switching systems . . . . . . . . . . . . . . . . 544--557 Victor Firoiu and Jim Kurose and Don Towsley Efficient admission control of piecewise linear traffic envelopes at EDF schedulers . . . . . . . . . . . . . . . 558--570 Shivakant Mishra and Lei Wu An evaluation of flow control in group communication . . . . . . . . . . . . . 571--587 Bruce Hajek and Linhai He On variations of queue response for inputs with the same mean and autocorrelation function . . . . . . . . 588--598 Lampros Kalampoukas and Anujan Varma Analysis of source policy and its effects on TCP in rate-controlled ATM networks . . . . . . . . . . . . . . . . 599--610 Dimitrios Stiliadis and Anujan Varma Latency-rate servers: a general model for analysis of traffic scheduling algorithms . . . . . . . . . . . . . . . 611--624 Kohei Shiomoto and Shinichiro Chaki and Naoaki Yamanaka A simple bandwidth management strategy based on measurements of instantaneous virtual path utilization in ATM networks 625--634 Abdelnaser Mohammad Adas Using adaptive linear prediction to support real-time VBR video under RCBR network service model . . . . . . . . . 635--644 Peter Kim Deterministic service guarantees in IEEE 802.12 networks --- part I: the single-hub case . . . . . . . . . . . . 645--658 Jinwoo Choe and Ness B. Shroff A central-limit-theorem-based approach for analyzing queue behavior in high-speed networks . . . . . . . . . . 659--671
Anja Feldmann and Jennifer Rexford and Ramón Cáceres Efficient policies for carrying Web traffic over flow-switched networks . . 673--685 Ching-Gung Liu and Deborah Estrin and Scott Shenker and Lixia Zhang Local error recovery in SRM: comparison of two approaches . . . . . . . . . . . 686--699 David K. Y. Yau and Simon S. Lam Migrating sockets --- end system support for networking with quality of service guarantees . . . . . . . . . . . . . . . 700--716 N. G. Duffield and K. K. Ramakrishnan and Amy R. Reibman SAVE: an algorithm for smoothed adaptive video over explicit rate networks . . . 717--728 Lampros Kalampoukas and Anujan Varma and K. K. Ramakrishnan Two-way TCP traffic over rate controlled channels: effects and analysis . . . . . 729--743 Rajiv Ramaswami and Galen Sasaki Multiwavelength optical networks with limited wavelength conversion . . . . . 744--754 Byrav Ramamurthy and Jason Iness and Biswanath Mukherjee Optimizing amplifier placements in a multiwavelength optical LAN/MAN: the unequally powered wavelengths case . . . 755--767 Dean H. Lorenz and Ariel Orda QoS routing in networks with uncertain parameters . . . . . . . . . . . . . . . 768--778 Debanjan Saha and Sarit Mukherjee and Satish K. Tripathi Carry-over round robin: a simple cell scheduling mechanism for ATM networks 779--796 Lalita A. Kulkarni and San-qi Li Performance analysis of a rate-based feedback control scheme . . . . . . . . 797--810 Brian L. Mark and Gopalakrishnan Ramamurthy Real-time estimation and dynamic renegotiation of UPC parameters for arbitrary traffic sources in ATM networks . . . . . . . . . . . . . . . . 811--827 Xiaohua Jia A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks . . . 828--837 Seok-Kyu Kweon and Kang G. Shin Providing deterministic delay guarantees in ATM networks . . . . . . . . . . . . 838--850 Anna Ha\'c and Bo Liu Database and location management schemes for mobile communications . . . . . . . 851--865
Imrich Chlamtac and Viktória Elek and Andrea Fumagalli and Csaba Szabó Scalable WDM access network architecture based on photonic slot routing . . . . . 1--9 Albert G. Greenberg and R. Srikant and Ward Whitt Resource sharing for book-ahead and instantaneous-request calls . . . . . . 10--22 Richard F. Hobson and P. S. Wong A parallel embedded-processor architecture for ATM reassembly . . . . 23--37 Junyi Li and Ness B. Shroff and Edwin K. P. Chong Channel carrying: a novel handoff scheme for mobile cellular networks . . . . . . 38--50 Imrich Chlamtac and Chiara Petrioli and Jason Redi Energy-conserving access protocols for identification networks . . . . . . . . 51--59 Ge Nong and Jogesh K. Muppala and Mounir Hamdi Analysis of nonblocking ATM switches with multiple input queues . . . . . . . 60--74 Jeffrey M. Capone and Ioannis Stavrakakis Delivering QoS requirements to traffic with diverse delay tolerances in a TDMA environment . . . . . . . . . . . . . . 75--87 Leandros Tassiulas Cut-through switching, pipelining, and scheduling for network evacuation . . . 88--97 Yijun Xiong and Lorne G. Mason Restoration strategies and spare capacity requirements in self-healing ATM networks . . . . . . . . . . . . . . 98--110 Ray-Guang Cheng and Chung-Ju Chang and Li-Fong Lin A QoS-Provisioning neural fuzzy connection admission controller for multimedia high-speed networks . . . . . 111--121 Alifo Lombardo and Giacomo Morabito and Giovanni Schembra A discrete-time paradigm to evaluate skew performance in a multimedia ATM multiplexer . . . . . . . . . . . . . . 122--139
Ian F. Akyildiz and David A. Levine and Inwhee Joe A slotted CDMA protocol with BER scheduling for wireless multimedia networks . . . . . . . . . . . . . . . . 146--158 Stuart Cheshire and Mary Baker Consistent overhead Byte stuffing . . . 159--172 Wu-chang Feng and Dilip D. Kandlur and Debanjan Saha and Kang G. Shin Understanding and improving TCP performance over networks with minimum rate guarantees . . . . . . . . . . . . 173--187 Nick McKeown The iSLIP scheduling algorithm for input-queued switches . . . . . . . . . 188--201 Jennifer Rexford and Don Towsley Smoothing variable-bit-rate video in an Internetwork . . . . . . . . . . . . . . 202--215 Yonghwan Kim and San-qi Li Performance analysis of data packet discarding in ATM networks . . . . . . . 216--227 Zygmunt J. Haas and Ben Liang Ad hoc mobility management with uniform quorum systems . . . . . . . . . . . . . 228--240 Chunming Qiao and Yousong Mei Off-line permutation embedding and scheduling in multiplexed optical networks with regular topologies . . . . 241--250 Mirjana Zafirovic-Vukotic and Ignatius G. M. M. Niemegeers Waiting time estimates in symmetric ATM-oriented rings with the destination release of used slots . . . . . . . . . 251--261 Ajei Gopal and Inder Gopal and Shay Kutten Fast broadcast in high-speed networks 262--275
Vern Paxson End-to-end Internet packet dynamics . . 277--292 Matthias Grossglauser and David N. C. Tse A framework for robust measurement-based admission control . . . . . . . . . . . 293--309 Rajeev Agrawal and Rene L. Cruz and Clayton Okino and Rajendran Rajan Performance bonds for flow control protocols . . . . . . . . . . . . . . . 310--323 Butler Lampson and Venkatachary Srinivasan and George Varghese IP lookups using multiway and multicolumn search . . . . . . . . . . . 324--334 Emmanouel A. Varvarigos and Jonathan P. Lang A virtual circuit deflection protocol 335--349 Roche A. Guérin and Ariel Orda QoS routing in networks with inaccurate information: theory and algorithms . . . 350--364 Ariel Orda Routing with end-to-end QoS guarantees in broadband networks . . . . . . . . . 365--374 Jörg Nonnenmacher and Ernst W. Biersack Scalable feedback for large groups . . . 375--386 Pietro Manzoni and Paolo Cremonesi and Giuseppe Serazzi Workload models of VBR video traffic and their use in resource allocation policies . . . . . . . . . . . . . . . . 387--397 Kavitha Chandra and Amy R. Reibman Modeling one- and two-layer variable bit rate video . . . . . . . . . . . . . . . 398--413 Rajesh K. Pankaj Wavelength requirements for multicasting in all-optical networks . . . . . . . . 414--424 Eytan Modiano Random algorithms for scheduling multicast traffic in WDM broadcast-and-select networks . . . . . 425--434 Xijun Zhang and Chunming Qiao On scheduling all-to-all personalized connections and cost-effective designs in WDM rings . . . . . . . . . . . . . . 435--445 Abel Dasylva and R. Srikant Optimal WDM schedules for optical star networks . . . . . . . . . . . . . . . . 446--456
Sally Floyd and Kevin Fall Promoting the use of end-to-end congestion control in the Internet . . . 458--472 Songwu Lu and Vaduvur Bharghavan and R. Srikant Fair scheduling in wireless packet networks . . . . . . . . . . . . . . . . 473--489 Francesco Lo Presti and Zhi-Li Zhang and Jim Kurose and Don Towsley Source time scale and optimal buffer/bandwidth tradeoff for heterogeneous regulated traffic in a network node . . . . . . . . . . . . . . 490--501 Chung Kei Wong and Simon S. Lam Digital signatures for flows and multicasts . . . . . . . . . . . . . . . 502--513 Sriram Raghavan and G. Manimaran and C. Siva Ram Murthy A rearrangeable algorithm for the construction delay-constrained dynamic multicast trees . . . . . . . . . . . . 514--529 Keith Kong and Dipak Ghosal Mitigating server-side congestion in the Internet through pseudoserving . . . . . 530--544 Gaoxi Xiao and Yiu-Wing Leung Algorithms for allocating wavelength converters in all-optical networks . . . 545--557 Wayne D. Grover High availability path design in ring-based optimal networks . . . . . . 558--574 Supriya Sharma and Yannis Viniotis Optimal buffer management policies for shared-buffer ATM switches . . . . . . . 575--587 Jae-Hyun Park and Hyunsoo Yoon and Heung-Kyu Lee The deflection self-routing Banyan network: a large-scale ATM switch using the fully adaptive self-routing and its performance analyses . . . . . . . . . . 588--604
Hemant M. Chaskar and T. V. Lakshman and U. Madhow TCP over wireless with link level error control: analysis and design methodology 605--615 Sunghyun Choi and Kang G. Shin An uplink CDMA system architecture with diverse QoS guarantees for heterogeneous traffic . . . . . . . . . . . . . . . . 616--628 Matthias Grossglauser and Jean-Chrysostome Bolot On the relevance of long-range dependence in network traffic . . . . . 629--640 Muriel Médard and Steven G. Finn and Richard A. Barry Redundant trees for preplanned recovery in arbitrary vertex-redundant or edge-redundant graphs . . . . . . . . . 641--652 Anindo Banerjea Fault recovery for guaranteed performance communications connections 653--668 Hanrijanto Sariowan and Rene L. Cruz and George C. Polyzos SCED: a generalized scheduling policy for guaranteeing quality-of-service . . 669--684 Wu-Chang Feng and Dilip D. Kandlur Adaptive packet marking for maintaining end-to-end throughput in a differentiated-services Internet . . . . 685--697 G. Manimaran and Hariharan Shankar Rahul and C. Siva Ram Murthy A new distributed route selection approach for channel establishment in real-time networks . . . . . . . . . . . 698--709 T. V. Lakshman and P. P. Mishra and K. K. Ramakrishnan Transporting compressed video over ATM networks with explicit-rate feedback control . . . . . . . . . . . . . . . . 710--723 Mayez A. Al-Mouhamed and Mohammed Kaleemuddin and Habib Yousef Evaluation of pipelined dilated banyan switch architectures for ATM networks 724--740 Aleksandar Kolarov and G. Ramamurthy A control-theoretic approach to the design of an explicit rate controller for ABR service . . . . . . . . . . . . 741--753 Suresh Subramaniam and Murat Azizo\uglu and Arun K. Somani On optimal converter placement in wavelength-routed networks . . . . . . . 754--766 Murat Alanyali and Ender Ayanoglu Provisioning algorithms for WDM optical networks . . . . . . . . . . . . . . . . 767--778 Ling Li and Arun K. Somani Dynamic wavelength routing using congestion and neighborhood information 779--786
Jon C. R. Bennett and Craig Partridge and Nicholas Shectman Packet reordering is not pathological network behavior . . . . . . . . . . . . 789--798 Stefano Basagni and Imrich Chlamtac and Danilo Bruschi A mobility-transparent deterministic broadcast mechanism for ad hoc networks 799--807 Zohar Naor and Hanoch Levy LATS: a load-adaptive threshold scheme for tracking mobile users . . . . . . . 808--817 Junyi Li and Ness B. Shroff and K. P. Chong A reduced-power channel reuse scheme for wireless packet cellular networks . . . 818--832 Ori Gerstel and Galen Sasaki and Shay Kutten and Rajiv Ramaswami Worst-case analysis of dynamic wavelength allocation in optical networks . . . . . . . . . . . . . . . . 833--846 Demet Aksoy and Michael Franklin $ R \times W $: a scheduling approach for large-scale on-demand data broadcast 846--860 Steven H. Low and David E. Lapsley Optimization flow control, I: basic algorithm and convergence . . . . . . . 861--874 Lavy Libman and Ariel Orda The designer's perspective to atomic noncooperative networks . . . . . . . . 875--884 Israel Cidon and Raphael Rom and Yuval Shavitt Analysis of multi-path routing . . . . . 885--896 Wei K. Tsai and John K. Antonio and Garng M. Huang Complexity of gradient projection method for optimal routing in data networks . . 897--905 Eyal Felstaine and Reuven Cohen On the distribution of routing computation in hierarchical ATM networks 906--916 Maan A. Kousa and Ahmed K. Elhakeem and Hui Yang Performance of ATM networks under hybrid ARQ/FEC error control scheme . . . . . . 917--925 Hanoch Levy and Tzippi Mendelson and Moshe Sidi and Joseph Keren-Zvi Sizing exit buffers in ATM networks: an intriguing coexistence of instability and tiny cell loss rates . . . . . . . . 926--936
Dan Decasper and Zubin Dittia and Guru Parulkar and Bernhard Plattner Router plugins: a software architecture for next-generation routers . . . . . . 2--15 Chung Kei Wong and Mohamed Gouda and Simon S. Lam Secure group communications using key graphs . . . . . . . . . . . . . . . . . 16--30 Mario Baldi and Yoram Ofek and Bülent Yener Adaptive group multicast with time-driven priority . . . . . . . . . . 31--43 Sunghyun Choi and Kang G. Shin A unified wireless LAN architecture for real-time and non-real-time communication services . . . . . . . . . 44--59 Steve Iatrou and Ioannis Stavrakakis A dynamic regulation and scheduling scheme for real-time traffic management 60--70 Nasir Ghani and Jon W. Mark Enhanced distributed explicit rate allocation for ABR services in ATM networks . . . . . . . . . . . . . . . . 71--86 Shivkumar Kalyanaraman and Raj Jain and Sonia Fahmy and Rohit Goyal and Bobby Vandalore The ERICA switch algorithm for ABR traffic management in ATM networks . . . 87--98 Ching-Fong Su and Gustavo De Veciana Statistical multiplexing and mix-dependent alternative routing in multiservice VP networks . . . . . . . . 99--108 Sung Hyuk Byun and Dan Keun Sung The UniMIN switch architecture for large-scale ATM switches . . . . . . . . 109--120
Jitendra Padhye and Victor Firoiu and Donald F. Towsley and James F. Kurose Modeling TCP Reno performance: a simple model and its empirical validation . . . 133--145 Oliver Spatscheck and Jòrgen S. Hansen and John H. Hartman and Larry L. Peterson Optimizing TCP forwarder performance . . 146--157 Luigi Rizzo and Lorenzo Vicisano Replacement policies for a proxy cache 158--170 Ioannis Ch. Paschalidis and John N. Tsitsiklis Congestion-dependent pricing of network services . . . . . . . . . . . . . . . . 171--184 Ion Stoica and Hui Zhang and T. S. Eugene Ng A hierarchical fair service curve algorithm for link-sharing, real-time, and priority services . . . . . . . . . 185--199 Mark D. Corner and Jörg Liebeherr and Nada Golmie and Chatschik Bisdikian and David H. Su A priority scheme for the IEEE 802.14 MAC protocol for hybrid fiber-coax networks . . . . . . . . . . . . . . . . 200--211 Subir K. Biswas and Rauf Izmailov Design of a fair bandwidth allocation policy for VBR traffic in ATM networks 212--212 Martin S. Lacher and Jörg Nonnenmacher and Ernst W. Biersack Performance comparison of centralized versus distributed error recovery for reliable multicast . . . . . . . . . . . 224--224 Douglas S. Reeves and Hussein F. Salama A distributed algorithm for delay-constrained unicast routing . . . 239--250 Adrian Grah and Terence D. Todd Packet-switched local area networks using wavelength-selective station couplers . . . . . . . . . . . . . . . . 251--264 Jean-Marc Berthaud Time synchronization over networks using convex closures . . . . . . . . . . . . 265--277
Li Fan and Pei Cao and Jussara Almeida and Andrei Z. Broder Summary cache: a scalable wide-area Web cache sharing protocol . . . . . . . . . 281--293 Sneha Kumar Kasera and Gísli Hjálmtýsson and Donald F. Towsley and James F. Kurose Scalable reliable multicast using multiple multicast channels . . . . . . 294--310 Shiwen Chen and Oktay Günlük and Bülent Yener The multicast packing problem . . . . . 311--318 Jie Li and Hisao Kameda and Keqin Li Optimal dynamic mobility management for PCS networks . . . . . . . . . . . . . . 319--327 Anthony S. Acampora and Srikanth V. Krishnamurthy A new adaptive MAC layer protocol for broadband packet wireless networks in harsh fading and interference environments . . . . . . . . . . . . . . 328--336 Jeong Geun Kim and Marwan M. Krunz Bandwidth allocation in wireless networks with guaranteed packet-loss performance . . . . . . . . . . . . . . 337--349 Ching-Fong Su and Gustavo De Veciana and Jean Walrand Explicit rate flow control for ABR services in ATM networks . . . . . . . . 350--361 Alain Mayer and Yoram Ofek and Moti Yung Local and congestion-driven fairness algorithm in arbitrary topology networks 362--372 Steven H. Low Equilibrium bandwidth and buffer allocations for elastic traffics . . . . 373--383 Olivier Crochat and Jean-Yves Le Boudec and Ornan Gerstel Protection interoperability for WDM optical networks . . . . . . . . . . . . 384--395 Biplab Sikdar and D. Manjunath Queueing analysis of scheduling policies in copy networks of space-based multicast packet switches . . . . . . . 396--406 Rajgopal Kannan and Sibabrata Ray MSXmin: a modular multicast ATM packet switch with low delay and hardware complexity . . . . . . . . . . . . . . . 407--418 Eric W. M. Wong and Andy K. M. Chan and Tak-Shing Peter Yum Analysis of rerouting in circuit-switched networks . . . . . . . 419--427
Zhi-Li Zhang and Yuewei Wang and David H. C. Du and Dongli Shu Video staging: a proxy-server-based approach to end-to-end video delivery over wide-area networks . . . . . . . . 429--442 Michel Abdalla and Yuval Shavitt and Avishai Wool Key management for restricted multicast using broadcast encryption . . . . . . . 443--454 Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei and Samrat Bhattacharjee Application-layer anycasting: a server selection architecture and use in a replicated Web service . . . . . . . . . 455--466 Matthew Roughan and Darryl Veitch and Patrice Abry Real-time estimation of the parameters of long-range dependence . . . . . . . . 467--478 Mario Baldi and Yoram Ofek End-to-end delay analysis of videoconferencing over packet-switched networks . . . . . . . . . . . . . . . . 479--492 Ilias Iliadis Optimal PNNI complex node representations for restrictive costs and minimal path computation time . . . 493--506 José M. Barceló and Jorge García-Vidal and Olga Casals Worst-case traffic in a tree network of ATM multiplexers . . . . . . . . . . . . 507--516 Wen-Tsuen Chen and Chun-Fu Huang and Yi-Luang Chang and Wu-Yuin Hwang An efficient cell-scheduling algorithm for multicast ATM switching systems . . 517--525 Dongsoo S. Kim and Ding-Zhu Du Performance of split routing algorithm for three-stage multicast networks . . . 526--534 Frank K. Hwang and Sheng-Chyang Liaw On nonblocking multicast three-stage Clos networks . . . . . . . . . . . . . 535--539
T. V. Lakshman and Upamanyu Madhow and Bernhard Suter TCP/IP performance with random loss and bidirectional congestion . . . . . . . . 541--555 Jeonghoon Mo and Jean Walrand Fair end-to-end window-based congestion control . . . . . . . . . . . . . . . . 556--567 P. Krishnan and Danny Raz and Yuval Shavitt The cache location problem . . . . . . . 568--582 Nicholas Bambos and Shou C. Chen and Gregory J. Pottie Channel access algorithms with active link protection for wireless communication networks with power control . . . . . . . . . . . . . . . . 583--597 Dhritiman Banerjee and Biswanath Mukherjee Wavelength-routed optical networks: linear formulation, resource budgeting tradeoffs, and a reconfiguration study 598--607 Xijun Zhang and Chunming Qiao An effective and comprehensive approach for traffic grooming and wavelength assignment in SONET/WDM rings . . . . . 608--617 Ornan Gerstel and Rajiv Ramaswami and Galen H. Sasaki Cost-effective traffic grooming in WDM rings . . . . . . . . . . . . . . . . . 618--630 Jason P. Jue and Biswanath Mukherjee Multiconfiguration multihop protocols: a new class of protocols for packet-switched WDM optical networks . . 631--642 Arthur W. Berger and Yaakov Kogan Dimensioning bandwidth for elastic traffic in high-speed data networks . . 643--654 Subir K. Biswas and Rauf Izmailov and Bhaskar Sengupta Connection splitting: an efficient way of reducing call blocking in ATM . . . . 655--666 Ha\"\ikel Ya\"\iche and Ravi R. Mazumdar and Catherine Rosenberg A game theoretic framework for bandwidth allocation and pricing in broadband networks . . . . . . . . . . . . . . . . 667--678 Chi-Chung Cheung and Danny H. K. Tsang and Sanjay Gupta Dynamic multicast routing based on mean number of new calls accepted before blocking for single rate loss networks 679--688
Jean-Yves Le Boudec and Olivier Verscheure Optimal smoothing for guaranteed service 689--696 Rose Qingyang Hu and David W. Petr A predictive self-tuning fuzzy-logic feedback rate controller . . . . . . . . 697--709 Michael Frey and Son Nguyen-Quang A gamma-based framework for modeling variable-rate MPEG video sources: the GOP GBAR model . . . . . . . . . . . . . 710--719 Brett J. Vickers and Célio Albuquerque and Tatsuya Suda Source-adaptive multilayered multicast algorithms for real-time video distribution . . . . . . . . . . . . . . 720--733 Paolo Narváez and Kai-Yeung Siu and Hong-Yi Tzeng New dynamic algorithms for shortest path tree computation . . . . . . . . . . . . 734--746 Yuhong Zhu and George N. Rouskas and Harry G. Perros A path decomposition approach for computing blocking probabilities in wavelength-routing networks . . . . . . 747--762 Eric Noel and K. Wendy Tang Performance modeling of multihop network subject to uniform and nonuniform geometric traffic . . . . . . . . . . . 763--774 Reuven Cohen and Gideon Kaempfer On the cost of virtual private networks 775--784 Frederico Cal\`\i and Marco Conti and Enrico Gregori Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit . . . . . . . . . . . . 785--799 Milosh Ivanovich and Moshe Zukerman and Fraser Cameron A study of deadlock models for a multiservice medium access protocol employing a Slotted Aloha signalling channel . . . . . . . . . . . . . . . . 800--811
Gustavo De Veciana and Takis Konstantopoulos and Tae-Jin Lee Stability and performance analysis of networks supporting elastic services . . 2--14 Santosh Paul Abraham and Anurag Kumar A new approach for asynchronous distributed rate control of elastic sessions in integrated packet networks 15--30 Ikjun Yeom and A. L. Narasimha Reddy Modeling TCP behavior in a differentiated services network . . . . 31--46 Thierry Chich and Pierre Fraigniaud and Johanne Cohen Unslotted deflection routing: a practical and efficient protocol for multihop optical networks . . . . . . . 47--59 Guangzhi Li and Rahul Simha On the wavelength assignment problem in multifiber WDM star and ring networks 60--68 Faisal Shad and Terence D. Todd and Vytas Kezys and John Litva Dynamic slot allocation (DSA) in indoor SDMA/TDMA using smart antenna basestation . . . . . . . . . . . . . . 69--81 Baruch Awerbuch and Yuval Shavitt Topology aggregation for directed graphs 82--90 Mario Gerla and Emilio Leonardi and Fabio Neri and Prasasth Palnati Routing in the bidirectional shufflenet 91--103 Emilio Leonardi and Marco Mellia and Fabio Neri and Marco Ajmone Marsan On the stability of input-queued switches with speed-up . . . . . . . . . 104--118
S.-H Gary Chan and Fouad Tobagi Distributed servers architecture for networked video services . . . . . . . . 125--136 Eylem Ekici and Ian F. Akyildiz and Michael D. Bender A distributed routing algorithm for datagram traffic in LEO satellite networks . . . . . . . . . . . . . . . . 137--147 Srikanth V. Krishnamurthy and Anthony S. Acampora and Michele Zorzi Polling-based media access protocols for use with smart adaptive array antennas 148--161 Anees Shaikh and Jennifer Rexford and Kang G. Shin Evaluating the impact of stale link state on quality-of-service routing . . 162--176 Katsuyoshi Iida and Tetsuya Takine and Hideki Sunahara and Yuji Oie Delay analysis for CBR traffic under static-priority scheduling . . . . . . . 177--185 Rajesh M. Krishnaswamy and Kumar N. Sivarajan Design of logical topologies: a linear formulation for wavelength-routed optical networks with no wavelength changers . . . . . . . . . . . . . . . . 186--198 Jingyu Qiu and Edward W. Knightly Measurement-based admission control with aggregate traffic envelopes . . . . . . 199--210 Shahrokh Valaee A recursive estimator of worst-case burstiness . . . . . . . . . . . . . . . 211--222
Stefan Savage and David Wetherall and Anna Karlin and Tom Anderson Network support for IP traceback . . . . 226--237 Paul Barford and Mark Crovella Critical path analysis of TCP transactions . . . . . . . . . . . . . . 238--248 Mikkel Christiansen and Kevin Jeffay and David Ott and F. Donelson Smith Tuning RED for Web traffic . . . . . . . 249--264 Anja Feldmann and Albert Greenberg and Carsten Lund and Nick Reingold and Jennifer Rexford and Fred True Deriving traffic demands for operational IP networks: methodology and experience 265--280 N. G. Duffield and Matthias Grossglauser Trajectory sampling for direct traffic observation . . . . . . . . . . . . . . 280--292 Craig Labovitz and Abha Ahuja and Abhijit Bose and Farnam Jahanian Delayed Internet routing convergence . . 293--306 Ian F. Akyildiz and Giacomo Morabito and Sergio Palazzo TCP-Peach: a new congestion control scheme for satellite IP networks . . . . 307--321 Song Chong and Sangho Lee and Sungho Kang A simple, scalable, and stable explicit rate allocation algorithm for MAX-MIN flow control with minimum rate guarantee 322--335 Vincent W. S. Wong and Mark E. Lewis and Victor C. M. Leung Stochastic control of path optimization for inter-switch handoffs in wireless ATM networks . . . . . . . . . . . . . . 336--350 J. Siwko and I. Rubin Connection admission control for capacity-varying networks with stochastic capacity change times . . . . 351--360 Hairong Sun and Xinyu Zang and Kishor S. Trivedi Performance of broadcast and unknown server (BUS) in ATM LAN emulation . . . 361--372 Verus Pronk and Jan Korst Comments on ``Carry-over Round Robin: A Simple Cell Scheduling Mechanism for ATM networks'' . . . . . . . . . . . . . . . 373--373
Sanjay Shakkottai and Anurag Kumar and Aditya Karnik and Ajit Anvekar TCP performance over end-to-end rate control and stochastic available capacity . . . . . . . . . . . . . . . . 377--391 Sally Floyd and Vern Paxson Difficulties in simulating the Internet 392--403 Pablo Rodriguez and Christian Spanner and Ernst W. Biersack Analysis of Web caching architectures: hierarchical and distributed caching . . 404--418 Ian F. Akyildiz and Inwhee Joe and Henry Driver and Yung-Lung Ho An adaptive FEC scheme for data traffic in wireless ATM networks . . . . . . . . 419--426 Zygmunt J. Haas and Marc R. Pearlman The performance of query control schemes for the zone routing protocol . . . . . 427--438 Oran Sharon and Eitan Altman An efficient polling MAC for wireless LANs . . . . . . . . . . . . . . . . . . 439--451 Zhi-Ren Chang and I-Chung Lee and Cheng-Shang Chang and Chien-Hsin Li and Ben-Li Sui A novel scheme using the information of departure processes for delay guarantees of distributed VBR traffic . . . . . . . 452--463 Arnaud Legout and Jörg Nonnenmacher and Ernst W. Biersack Bandwidth-allocation policies for unicast and multicast flows . . . . . . 464--478 Shalabh Bhatnagar and Michael C. Fu and Steven I. Marcus and Pedram J. Fard Optimal structured feedback policies for ABR flow control using two-timescale SPSA . . . . . . . . . . . . . . . . . . 479--491 Yishay Mansour and Boaz Patt-Shamir Jitter control in QoS networks . . . . . 492--502 Jonathan P. Lang and Vishal Sharma and Emmanouel A. Varvarigos An analysis of oblivious and adaptive routing in optical networks with wavelength translation . . . . . . . . . 503--517 Xiaojun Shen and Fan Yang and Yi Pan Equivalent permutation capabilities between time-division optical omega networks and non-optical extra-stage omega networks . . . . . . . . . . . . . 518--524
Paul Francis and Sugih Jamin and Cheng Jin and Yixin Jin and Danny Raz and Yuval Shavitt and Lixia Zhang IDMaps: a global Internet host distance estimation service . . . . . . . . . . . 525--540 Maurizio A. Bonuccelli and M. Claudia Cl\`o Scheduling of real-time messages in optical broadcast-and-select networks 541--552 G. Mohan and C. Siva Ram Murthy and Arun K. Somani Efficient algorithms for routing dependable connections in WDM optical networks . . . . . . . . . . . . . . . . 553--566 Ayan Banerjee and Ronald A. Iltis and Emmanouel A. Varvarigos Performance evaluation for a quasi-synchronous packet radio network (QSPNET) . . . . . . . . . . . . . . . . 567--577 Qiong Li and David L. Mills Jitter-based delay-boundary prediction of wide-area networks . . . . . . . . . 578--590 Brahim Bensaou and Danny H. K. Tsang and King Tung Chan Credit-based fair queueing (CBFQ): a simple service-scheduling algorithm for packet-switched networks . . . . . . . . 591--604 Vahid Tabatabaee and Leonidas Georgiadis and Leandros Tassiulas QoS provisioning and tracking fluid policies in input queueing switches . . 605--617 Cory C. Beard and Victor S. Frost Prioritized resource allocation for stressed networks . . . . . . . . . . . 618--633 Sheng Ma and Chuanyi Ji Modeling heterogeneous network traffic in wavelet domain . . . . . . . . . . . 634--649 Manolis G. H. Katevenis and Iakovos Mavroidis and Georgios Sapountzis and Eva Kalyvianaki and Ioannis Mavroidis and Georgios Glykopoulos Wormhole IP over (connectionless) ATM 650--661 Yiu Kwok Tham A unified algorithmic framework for variable-rate TDM switching assignments 662--668 Efstratios Thomopoulos and Louise E. Moser and Peter M. Melliar-Smith Latency analysis of the totem single-ring protocol . . . . . . . . . . 669--680
Lixin Gao and Jennifer Rexford Stable Internet routing without global coordination . . . . . . . . . . . . . . 681--692 Yehuda Afek and Anat Bremler-Barr and Sariel Har-Peled Routing with a clue . . . . . . . . . . 693--705 Paolo Narváez and Kai-Yeung Siu and Hong-Yi Tzeng New dynamic SPT algorithm based on a ball-and-string model . . . . . . . . . 706--718 Piet Van Mieghem and Gerard Hooghiemstra and Remco van der Hofstad On the efficiency of multicast . . . . . 719--732 Lixin Gao On inferring autonomous system relationships in the Internet . . . . . 733--745 Weilian Su and Ian F. Akyildiz The jitter time-stamp approach for clock recovery of real-time variable bit-rate traffic . . . . . . . . . . . . . . . . 746--754 Han S. Kim and Ness B. Shroff Loss probability calculations and asymptotic analysis for finite buffer multiplexers . . . . . . . . . . . . . . 755--768 Hannu Rummukainen and Jorma Virtamo Polynomial cost approximations in Markov decision theory based call admission control . . . . . . . . . . . . . . . . 769--779 R. Radhakrishna Pillai A distributed overload control algorithm for delay-bounded call setup . . . . . . 780--789 Mingbo Xiao and Ness B. Shroff and Edwin K. P. Chong Distributed admission control for power-controlled cellular wireless systems . . . . . . . . . . . . . . . . 790--800 Matthew K. H. Leung and John C. S. Lui and David K. Y. Yau Adaptive proportional delay differentiated services: characterization and performance evaluation . . . . . . . . . . . . . . . 801--817 Ramesh Johari and David Kim Hong Tan End-to-end congestion control for the Internet: delays and stability . . . . . 818--832 James Begole and Randall B. Smith and Craig A. Struble and Clifford A. Shaffer Resource sharing for replicated synchronous groupware . . . . . . . . . 833--843
Mostafa H. Ammar Editorial . . . . . . . . . . . . . . . 1--1 Erich Nahum and Tsipora Barzilai and Dilip D. Kandlur Performance issues in WWW servers . . . 2--11 Constantinos Dovrolis and Dimitrios Stiliadis and Parameswaran Ramanathan Proportional differentiated services: delay differentiation and packet scheduling . . . . . . . . . . . . . . . 12--26 Martin Reisslein and Keith W. Ross and Srinivas Rajagopal A framework for guaranteeing statistical QoS . . . . . . . . . . . . . . . . . . 27--42 Jorge Arturo Cobb Preserving quality of service guarantees in spite of flow aggregation . . . . . . 43--53 Shuqian Yan and Michalis Faloutsos and Anindo Banerjea QoS-aware multicast routing for the Internet: the design and evaluation of QoSMIC . . . . . . . . . . . . . . . . . 54--66 Xi Zhang and Kang G. Shin and Debanjan Saha and Dilip D. Kandlur Scalable flow control for multicast ABR services in ATM networks . . . . . . . . 67--85 Rung-Hung Gau and Zygmunt J. Haas and Bhaskar Krishnamachari On multicast flow control for heterogeneous receivers . . . . . . . . 86--101 Dean H. Lorenz and Ariel Orda Optimal partition of QoS requirements on unicast paths and multicast trees . . . 102--114 Aref Meddeb and André Girard and Catherine Rosenberg The impact of point-to-multipoint traffic concentration on multirate networks design . . . . . . . . . . . . 115--124 Guoqiang Mao and Daryoush Habibi Loss performance analysis for heterogeneous \sc ON-OFF sources with application to connection admission control . . . . . . . . . . . . . . . . 125--138 Srivatsan Varadarajan and Hung Q. Ngo and Jaideep Srivastava Error spreading: a perception-driven approach to handling error in continuous media streaming . . . . . . . . . . . . 139--152 Muriel Médard and Richard A. Barry and Steven G. Finn and Wenbo He and Steven S. Lumetta Generalized loop-back recovery in optical mesh networks . . . . . . . . . 153--164
Dan Rubenstein and Jim Kurose and Don Towsley The impact of multicast layering on network fairness . . . . . . . . . . . . 169--182 Eylem Ekici and Ian F. Akyildiz and Michael D. Bender A multicast routing algorithm for LEO satellite IP networks . . . . . . . . . 183--192 Mark A. Smith and K. K. Ramakrishnan Formal specification and verification of safety and performance of TCP selective acknowledgment . . . . . . . . . . . . . 193--207 Xi-Ren Cao and Hong-Xia Shen and Rodolfo Milito and Patrica Wirth Internet pricing with a game theoretical approach: concepts and examples . . . . 208--216 Costas A. Courcoubetis and Antonis Dimakis and George D. Stamoulis Traffic equivalence and substitution in a multiplexer with applications to dynamic available capacity estimation 217--231 Timothy G. Griffin and F. Bruce Shepherd and Gordon Wilfong The stable paths problem and interdomain routing . . . . . . . . . . . . . . . . 232--243 Xin Yuan Heuristic algorithms for multiconstrained quality-of-service routing . . . . . . . . . . . . . . . . 244--256 Si Wu and K. Y. Michael Wong and Bo Li A dynamic call admission policy with precision QoS guarantee using stochastic control for mobile wireless networks . . 257--271 Richard J. La and Venkat Anantharam Utility-based rate control in the Internet for elastic traffic . . . . . . 272--286 Aleksandra Smiljani\'c Flexible bandwidth allocation in high-capacity packet switches . . . . . 287--293
Suchitra Raman and Hari Balakrishnan and Murari Srinivasan ITP: an Image Transport Protocol for the Internet . . . . . . . . . . . . . . . . 297--307 Mohamed G. Gouda and E. N. (Mootaz) Elnozahy and Chin-Tser Huang and Tommy M. McGuire Hop integrity in computer networks . . . 308--319 Laurent Massoulié and James Roberts Bandwidth sharing: objectives and algorithms . . . . . . . . . . . . . . . 320--328 Jean-Yves Le Boudec Some properties of variable length packet shapers . . . . . . . . . . . . . 329--337 Lampros Kalampoukas and Anujan Varma and K. K. Ramakrishnan Explicit window adaptation: a method to enhance TCP performance . . . . . . . . 338--350 Ramu Ramamurthy and Biswanath Mukherjee Fixed-alternate routing and wavelength conversion in wavelength-routed optical networks . . . . . . . . . . . . . . . . 351--367 Ellen L. Hahne and Abhijit K. Choudhury Dynamic queue length thresholds for multiple loss priorities . . . . . . . . 368--380 Dan Rubenstein and Jim Kurose and Don Towsley Detecting shared congestion of flows via end-to-end measurement . . . . . . . . . 381--395 Ramachandran Ramjee and Kannan Varadhan and Luca Salgarelli and Sandra R. Thuel and Shie-Yuan Wang and Thomas La Porta HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks . . . . . . . . . . . 396--410 Ian F. Akyildiz and Eylem Ekici and Michael D. Bender MLSR: a novel routing algorithm for multilayered satellite IP networks . . . 411--424 Ioannis Ch. Paschalidis and Yong Liu Pricing in multiservice loss networks: static pricing, asymptotic optimality, and demand substitution effects . . . . 425--438
Konstantinos Psounis and Balaji Prabhakar Efficient randomized web-cache replacement schemes using samples from past eviction times . . . . . . . . . . 441--455 Pablo Rodriguez and Ernst W. Biersack Dynamic parallel access to replicated content in the Internet . . . . . . . . 455--465 Jack Brassil and Henning Schulzrinne Structuring Internet media streams with cueing protocols . . . . . . . . . . . . 466--476 Matthias Grossglauser and David N. C. Tse Mobility increases the capacity of ad hoc wireless networks . . . . . . . . . 477--486 Elif Uysal-Biyikoglu and Balaji Prabhakar and Abbas El Gamal Energy-efficient packet transmission over a wireless link . . . . . . . . . . 487--499 Augustin Chaintreau and François Baccelli and Christophe Diot Impact of TCP-like congestion control on the throughput of multicast groups . . . 500--512 Wu-chang Feng and Kang G. Shin and Dilip D. Kandlur and Debanjan Saha The \sc BLUE active queue management algorithms . . . . . . . . . . . . . . . 513--528 Jon C. R. Bennett and Kent Benson and Anna Charny and William F. Courtney and Jean-Yves Le Boudec Delay jitter bounds and packet scale rate guarantee for expedited forwarding 529--540 João Luís Sobrinho Algebra and algorithms for QoS path computation and hop-by-hop routing in the Internet . . . . . . . . . . . . . . 541--550 Lavy Libman and Ariel Orda Optimal retrial and timeout strategies for accessing network resources . . . . 551--564 Amit Kumar and Rajeev Rastogi and Avi Silberschatz and Bulent Yener Algorithms for provisioning virtual private networks in the hose model . . . 565--578 Yann d'Halluin and Peter A. Forsyth and Kenneth R. Vetzal Managing capacity for telecommunications networks under uncertainty . . . . . . . 579--587
Jaeyeon Jung and Emil Sit and Hari Balakrishnan and Robert Morris DNS performance and the effectiveness of caching . . . . . . . . . . . . . . . . 589--603 Michael Mitzenmacher Compressed bloom filters . . . . . . . . 604--612 Roch Guérin and Ariel Orda Computing shortest paths for any number of hops . . . . . . . . . . . . . . . . 613--620 Ran Libeskind-Hadas and Rami Melhem Multicast routing and wavelength assignment in multihop optical networks 621--629 Zoe Antoniou and Ioannis Stavrakakis An efficient deadline-credit-based transport scheme for prerecorded semisoft continuous media applications 630--643 Franco Blanchini and Renato Lo Cigno and Roberto Tempo Robust rate control for integrated services packet networks . . . . . . . . 644--652 Saad Mneimneh and Vishal Sharma and Kai-Yeung Siu Switching using parallel input-output queued switches with no speedup . . . . 653--665 Marco Ajmone Marsan and Andrea Bianco and Paolo Giaccone and Emilio Leonardi and Fabio Neri Packet-mode scheduling in input-queued cell-based switches . . . . . . . . . . 666--678 N. G. Duffield and Pawan Goyal and Albert Greenberg and Partho Mishra and K. K. Ramakrishnan and Jacobus E. van der Merwe Resource management with hoses: point-to-cloud services for virtual private networks . . . . . . . . . . . . 679--692 Young Lee and James M. Tien Static and dynamic approaches to modeling end-to-end routing in circuit-switched networks . . . . . . . 693--705
Colleen Shannon and David Moore and K. C. Claffy Beyond folklore: observations on fragmented traffic . . . . . . . . . . . 709--720 Alex C. Snoeren and Craig Partridge and Luis A. Sanchez and Christine E. Jones and Fabrice Tchakountio and Beverly Schwartz and Stephen T. Kent and W. Timothy Strayer Single-packet IP traceback . . . . . . . 721--734 Evangelos P. Markatos and Dionisios N. Pnevmatikatos and Michail D. Flouris and Manolis G. H. Katevenis Web-conscious storage management for Web proxies . . . . . . . . . . . . . . . . 735--748 Yigal Bejerano and Israel Cidon and Joseph (Seffi) Naor Efficient handoff rerouting algorithms: a competitive on-line algorithmic approach . . . . . . . . . . . . . . . . 749--760 Francesco Lo Presti and N. G. Duffield and Joe Horowitz and Don Towsley Multicast-based inference of network-internal delay distributions . . 761--775 Chengzhi Li and Edward W. Knightly Coordinated multihop scheduling: a framework for end-to-end services . . . 776--789 Srihari Nelakuditi and Zhi Li Zhang and Rose P. Tsang and David H. C. Du Adaptive proportional routing: a localized QoS routing approach . . . . . 790--804 Cheng Shang Chang and Rene L. Cruz and Jean Yves Le Boudec and Patrick Thiran A min,+ system theory for constrained traffic regulation and dynamic service guarantees . . . . . . . . . . . . . . . 805--817 Leonidas Georgiadis and Panos Georgatsos and Konstantinos Floros and Stelios Sartzetakis Lexicographically optimal balanced networks . . . . . . . . . . . . . . . . 818--829 Eiji Oki and Zhigang Jing and Roberto Rojas-Cessa and H. Jonathan Chao Concurrent round-robin-based dispatching schemes for Clos-network switches . . . 830--844
Mostafa Ammar Editorial . . . . . . . . . . . . . . . 1--1 Chalermek Intanagonwiwat and Ramesh Govindan and Deborah Estrin and John Heidemann and Fabio Silva Directed diffusion for wireless sensor networking . . . . . . . . . . . . . . . 2--16 Ion Stoica and Robert Morris and David Liben-Nowell and David R. Karger and M. Frans Kaashoek and Frank Dabek and Hari Balakrishnan Chord: a scalable peer-to-peer lookup protocol for Internet applications . . . 17--32 Ion Stoica and Scott Shenker and Hui Zhang \em Core-stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks . . . . . . . . . . . . . . . . 33--46 Alfio Lombardo and Giovanni Schembra Performance evaluation of an adaptive-rate MPEG encoder matching intserv traffic constraints . . . . . . 47--65 Neil J. Keon and G. Anandalingam Optimal pricing for multiple services in telecommunications networks offering quality-of-service guarantees . . . . . 66--80 Krishna Phani Gummadi and Madhavarapu Jnana Pradeep and C. Siva Ram Murthy An efficient primary-segmented backup scheme for dependable real-time communication in multihop networks . . . 81--94 Jiafu He and Khosrow Sohraby An extended combinatorial analysis framework for discrete-time queueing systems with general sources . . . . . . 95--110 R. Srinivasan and Arun K. Somani On achieving fairness and efficiency in high-speed shared medium access . . . . 111--124 Qing Zhao and Lang Tong A multiqueue service room MAC protocol for wireless networks with multipacket reception . . . . . . . . . . . . . . . 125--137 Michael J. Neely and Eytan Modiano and Charles E. Rohrs Power allocation and routing in multibeam satellites with time-varying channels . . . . . . . . . . . . . . . . 138--152 Robert C. Chalmers and Kevin C. Almeroth On the topology of multicast trees . . . 153--165 Joshua Auerbach and Madan Gopal and Marc Kaplan and Shay Kutten Multicast group membership management 166--175
Rajeev Rastogi and Yuri Breitbart and Minos Garofalakis and Amit Kumar Optimal configuration of OSPF aggregates 181--194 Anirban Mahanti and Derek L. Eager and Mary K. Vernon and David J. Sundaram-Stukel Scalable on-demand media streaming with packet loss recovery . . . . . . . . . . 195--209 Mingbo Xiao and Ness B. Shroff and Edwin K. P. Chong A utility-based power-control scheme in wireless cellular systems . . . . . . . 210--221 Do Young Eun and Ness B. Shroff A measurement-analytic approach for QoS estimation in a network based on the dominant time scale . . . . . . . . . . 222--235 Aysegül Gençata and Biswanath Mukherjee Virtual-topology adaptation for WDM mesh networks under dynamic traffic . . . . . 236--247 Hui Zang and Canhui Ou and Biswanath Mukherjee Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints . . . . . . 248--258 Asuman E. Ozdaglar and Dimitri P. Bertsekas Routing and wavelength assignment in optical networks . . . . . . . . . . . . 259--272 Kayi Lee and Kai-Yeung Siu On the reconfigurability of single-hub WDM ring networks . . . . . . . . . . . 273--284 Hongyue Zhu and Hui Zang and Keyao Zhu and Biswanath Mukherjee A novel generic graph model for traffic grooming in heterogeneous WDM mesh networks . . . . . . . . . . . . . . . . 285--299 Michael Dahlin and Bharat Baddepudi V. Chandra and Lei Gao and Amol Nayate End-to-end WAN service availability . . 300--313 Sundar Iyer and Nick W. McKeown Analysis of the parallel packet switch architecture . . . . . . . . . . . . . . 314--324 Man Chi Chan and Tony T. Lee Statistical performance guarantees in large-scale cross-path packet switch . . 325--337 Andrzej Karbowski Comments on ``Optimization flow control, I: Basic algorithm and convergence'' . . 338--339
Shudong Jin and Liang Guo and Ibrahim Matta and Azer Bestavros A spectrum of TCP-friendly window-based congestion control algorithms . . . . . 341--355 Jim Martin and Arne Nilsson and Injong Rhee Delay-based congestion avoidance for TCP 356--369 Farooq Anjum and Leandros Tassiulas Comparative study of various TCP versions over a wireless link with correlated losses . . . . . . . . . . . 370--383 Turgay Korkmaz and Marwan Krunz Bandwidth-delay constrained path selection under inaccurate state information . . . . . . . . . . . . . . 384--398 Murali Kodialam and T. V. Lakshman Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information . . . . . . . . . . . . . . 399--410 David Starobinski and Mark Karpovsky and Lev A. Zakrevski Application of network calculus to general topologies using turn-prohibition . . . . . . . . . . . . 411--421 Huirong Fu and Edward W. Knightly A simple model of real-time flow aggregation . . . . . . . . . . . . . . 422--435 Xi Zhang and Kang G. Shin Delay analysis of feedback-synchronization signaling for multicast flow control . . . . . . . . . 436--450 Mario Baldi and Yoram Ofek A comparison of ring and tree embedding for real-time group multicast . . . . . 451--464 Marco Ajmone Marsan and Andrea Bianco and Paolo Giaccone and Emilio Leonardi and Fabio Neri Multicast traffic in input-queued switches: optimal scheduling and maximum throughput . . . . . . . . . . . . . . . 465--477 Hakyong Kim and Kiseon Kim Performance analysis of the multiple input-queued packet switch with the restricted rule . . . . . . . . . . . . 478--487 Alvin C. Fu and Eytan Modiano and John N. Tsitsiklis Optimal energy allocation and admission control for communications satellites 488--500 Andrea Fumagalli and Isabella Cerutti and Marco Tacca Optimal design of survivable mesh networks based on line switched WDM self-healing rings . . . . . . . . . . . 501--512
Ellen W. Zegura Editorial . . . . . . . . . . . . . . . 513--513 Georgos Siganos and Michalis Faloutsos and Petros Faloutsos and Christos Faloutsos Power laws and the AS-level Internet topology . . . . . . . . . . . . . . . . 514--524 Steven H. Low A duality model of TCP and queue management algorithms . . . . . . . . . 525--536 Manish Jain and Constantinos Dovrolis End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput . . . . . . 537--549 Matthias Grossglauser and David N. C. Tse A time-scale decomposition approach to measurement-based admission control . . 550--563 Dmitri Loguinov and Hayder Radha End-to-end rate-based congestion control: convergence properties and scalability analysis . . . . . . . . . . 564--577 Ariel Orda and Alexander Sprintson Precomputation schemes for QoS routing 578--591 Hemant M. Chaskar and Upamanyu Madhow Fair scheduling with tunable latency: a round-robin approach . . . . . . . . . . 592--601 John N. Daigle and Marcos Nascimento Magalhães Analysis of packet networks having contention-based reservation with application to GPRS . . . . . . . . . . 602--615 Roberto Rojas-Cessa and Eiji Oki and H. Jonathan Chao Concurrent fault detection for a multiple-plane packet switch . . . . . . 616--627 Mihail L. Sichitiu and Peter H. Bauer and Kamal Premaratne The effect of uncertain time-variant delays in ATM networks with explicit rate feedback: a control theoretic approach . . . . . . . . . . . . . . . . 628--637 Uttam K. Sarkar and Subramanian Ramakrishnan and Dilip Sarkar Modeling full-length video using Markov-modulated Gamma-based framework 638--649 Sartaj Sahni and Kun Suk Kim Efficient construction of multibit tries for IP lookup . . . . . . . . . . . . . 650--662 Mohamed G. Gouda and Marco Schneider Maximizable routing metrics . . . . . . 663--675 Murali Kodialam and T. V. Lakshman and Sudipta Sengupta Online multicast routing with bandwidth guarantees: a new approach using multicast network flow . . . . . . . . . 676--686
Srisankar Kunniyur and R. Srikant End-to-end congestion control schemes: utility functions, random losses and ECN marks . . . . . . . . . . . . . . . . . 689--702 Song Cen and Pamela C. Cosman and Geoffrey M. Voelker End-to-end differentiation of congestion and wireless losses . . . . . . . . . . 703--717 Ben Liang and Zygmunt J. Haas Predictive distance-based mobility management for multidimensional PCS networks . . . . . . . . . . . . . . . . 718--732 Peter Marbach Priority service and max-min fairness 733--746 Athina P. Markopoulou and Fouad A. Tobagi and Mansour J. Karam Assessing the quality of voice communications over Internet backbones 747--760 Guangzhi Li and Dongmei Wang and Charles Kalmanek and Robert Doverspike Efficient distributed restoration path selection for shared mesh restoration 761--771 Koushik Kar and Murali Kodialam and T. V. Lakshman Routing restorable bandwidth guaranteed connections using maximum $2$-route flows . . . . . . . . . . . . . . . . . 772--781 Ralf Koetter and Muriel Médard An algebraic approach to network coding 782--795 Mariusz A. Fecko and M. Ümit Uyar and Ali Y. Duale and Paul D. Amer A technique to generate feasible tests for communications systems with multiple timers . . . . . . . . . . . . . . . . . 796--809 Jean-Yves Le Boudec and Anna Charny Packet scale rate guarantee for non-FIFO nodes . . . . . . . . . . . . . . . . . 810--820 Sem Borst and Michel Mandjes and Miranda van Uitert Generalized processor sharing with light-tailed and heavy-tailed input . . 821--834 Brian Towles and William J. Dally Guaranteed scheduling for switches with configuration overhead . . . . . . . . . 835--847 Matthew Andrews and Lisa Zhang Achieving stability in networks of input-queued switches . . . . . . . . . 848--857 Saad Mneimneh and Kai-Yeung Siu On achieving throughput in an input-queued switch . . . . . . . . . . 858--867
Ellen Zegura Editorial . . . . . . . . . . . . . . . 869--869 Zhenhai Duan and Zhi-Li Zhang and Yiwei Thomas Hou Service overlay networks: SLAs, QoS, and bandwidth provisioning . . . . . . . . . 870--883 Lixin Gao and Zhi-Li Zhang and Don Towsley Proxy-assisted techniques for delivering continuous multimedia streams . . . . . 884--894 Supratik Bhattacharyya and James F. Kurose and Don Towsley and Ramesh Nagarajan Efficient rate-controlled bulk data transfer using multiple multicast groups 895--907 X. Brian Zhang and Simon S. Lam and Dong-Young Lee and Y. Richard Yang Protocol design for scalable and reliable group rekeying . . . . . . . . 908--922 Mark Karol and S. Jamaloddin Golestani and David Lee Prevention of deadlocks and livelocks in lossless backpressured packet networks 923--934 Tapan Kumar Nayak and Kumar N. Sivarajan Dimensioning optical networks under traffic growth models . . . . . . . . . 935--947 Daniel P. Heyman and David Lucantoni Modeling multiple IP traffic streams with rate limits . . . . . . . . . . . . 948--958 Biplab Sikdar and Shivkumar Kalyanaraman and Kenneth S. Vastola Analytic models for the latency and steady-state throughput of TCP Tahoe, Reno, and SACK . . . . . . . . . . . . . 959--971 Sanjay Shakkottai and R. Srikant and Sean P. Meyn Bounds on the throughput of congestion controllers in the presence of feedback delay . . . . . . . . . . . . . . . . . 972--981 Xiaohong Jiang and Hong Shen and Md. Mamun-ur-Rashid Khandker and Susumu Horiguchi Blocking behaviors of crosstalk-free optical Banyan networks on vertical stacking . . . . . . . . . . . . . . . . 982--993 Peng-Yong Kong and Kee-Chaing Chua and Brahim Bensaou A novel scheduling scheme to share dropping ratio while guaranteeing a delay bound in a multiCode-CDMA network 994--1006
Ellen Zegura Editorial . . . . . . . . . . . . . . . 1--1 Neil Spring and Ratul Mahajan and David Wetherall and Thomas Anderson Measuring ISP topologies with rocketfuel 2--16 King-Shan Lui and Klara Nahrstedt and Shigang Chen Routing with topology aggregation in delay-bandwidth sensitive networks . . . 17--29 Daniel Zappala Alternate path routing for multicast . . 30--43 Ahmed Helmy and Sandeep Gupta and Deborah Estrin The STRESS method for boundary-point performance analysis of end-to-end multicast timer-suppression mechanisms 44--58 Admela Jukan and Gerald Franzl Path selection methods with multiple constraints in service-guaranteed WDM networks . . . . . . . . . . . . . . . . 59--72 Pin-Han Ho and Hussein T. Mouftah Reconfiguration of spare capacity for MPLS-based recovery in the Internet backbone networks . . . . . . . . . . . 73--84 Violeta Gambiroza and Ping Yuan and Laura Balzano and Yonghe Liu and Steve Sheafor and Edward Knightly Design, analysis, and implementation of DVSR: a fair high-performance protocol for packet rings . . . . . . . . . . . . 85--102 Xudong Wang Wide-band TD-CDMA MAC with minimum-power allocation and rate- and BER-scheduling for wireless multimedia networks . . . . 103--116 Rung-Hung Gau and Zygmunt J. Haas Concurrent search of mobile users in cellular networks . . . . . . . . . . . 117--130 Wei Li and Xiuli Chao Modeling and performance evaluation of a cellular mobile network . . . . . . . . 131--145 Zuji Mao and Christos Douligeris A distributed database architecture for global roaming in next-generation mobile networks . . . . . . . . . . . . . . . . 146--160 Dongyu Qiu and Ness B. Shroff A predictive flow control scheme for efficient network utilization and QoS 161--172 Célio Albuquerque and Brett J. Vickers and Tatsuya Suda Network border patrol: preventing congestion collapse and promoting fairness in the Internet . . . . . . . . 173--186 Ben-Jye Chang and Ren-Hung Hwang Performance analysis for hierarchical multirate loss networks . . . . . . . . 187--199
Ion Stoica and Daniel Adkins and Shelley Zhuang and Scott Shenker and Sonesh Surana Internet indirection infrastructure . . 205--218 Subhabrata Sen and Jia Wang Analyzing peer-to-peer traffic across large networks . . . . . . . . . . . . . 219--232 James R. Challenger and Paul Dantzig and Arun Iyengar and Mark S. Squillante and Li Zhang Efficiently serving dynamic data at highly accessed Web sites . . . . . . . 233--246 Emmanuel Léty and Thierry Turletti and François Baccelli SCORE: a scalable communication protocol for large-scale virtual environments . . 247--260 David Watson and Matthew Smart and G. Robert Malan and Farnam Jahanian Protocol scrubbing: network security through transparent flow modification 261--273 Supratim Deb and R. Srikant Congestion control for fair resource allocation in networks with multicast flows . . . . . . . . . . . . . . . . . 274--285 Srisankar S. Kunniyur and R. Srikant An adaptive virtual queue (AVQ) algorithm for active queue management 286--299 Michele Garetto and Renato Lo Cigno and Michela Meo and Marco Ajmone Marsan Closed queueing network models of interacting long-lived TCP flows . . . . 300--311 Peter Marbach Analysis of a static pricing scheme for priority services . . . . . . . . . . . 312--325 Shengquan Wang and Dong Xuan and Riccardo Bettati and Wei Zhao Providing absolute differentiated services for real-time applications in static-priority scheduling networks . . 326--339 Moses Charikar and Joseph Naor and Baruch Schieber Resource optimization in QoS multicast routing of real-time multimedia . . . . 340--348 Shanchieh Jay Yang and Gustavo De Veciana Enhancing both network and user performance for networks supporting best effort traffic . . . . . . . . . . . . . 349--360 Mingyan Liu and John S. Baras Fixed point approximation for multirate multihop loss networks with state-dependent routing . . . . . . . . 361--374 Jeff R. K. Hartline and Ran Libeskind-Hadas and Kurt M. Dresner and Ethan W. Drucker and Katrina J. Ray Optimal virtual topologies for one-to-many communication in WDM paths and rings . . . . . . . . . . . . . . . 375--383 Ashwin Sridharan and Kumar N. Sivarajan Blocking in all-optical networks . . . . 384--397
Yuri Breitbart and Minos Garofalakis and Ben Jai and Cliff Martin and Rajeev Rastogi and Avi Silberschatz Topology discovery in heterogeneous IP networks: the \em NetInventory system 401--414 Constantino M. Lagoa and Hao Che and Bernardo A. Movsichoff Adaptive control algorithms for decentralized optimal traffic engineering in the Internet . . . . . . 415--428 Raymond R.-F. Liao and Andrew T. Campbell Dynamic core provisioning for quantitative differentiated services . . 429--442 Alfio Lombardo and Giacomo Morabito and Giovanni Schembra A novel analytical framework compounding statistical traffic modeling and aggregate-level service curve disciplines: network performance and efficiency implications . . . . . . . . 443--455 Christos Papadopoulos and Guru Parulkar and George Varghese Light-weight multicast services (LMS): a router-assisted scheme for reliable multicast . . . . . . . . . . . . . . . 456--468 Pavlin Radoslavov and Christos Papadopoulos and Ramesh Govindan and Deborah Estrin A comparison of application-level and router-assisted hierarchical schemes for reliable multicast . . . . . . . . . . . 469--482 Danny Raz and Yuval Shavitt and Lixia Zhang Distributed council election . . . . . . 483--492 Wei Ye and John Heidemann and Deborah Estrin Medium access control with coordinated adaptive sleeping for wireless sensor networks . . . . . . . . . . . . . . . . 493--506 Peng-Jun Wan and Gruia Cãlinescu and Chih-Wei Yi Minimum-power multicast routing in static ad hoc wireless networks . . . . 507--514 Feng Xie and Joseph L. Hammond and Daniel L. Noneaker Steady-state analysis of a split-connection scheme for Internet access through a wireless terminal . . . 515--525 Xiangdong Qin and Yuanyuan Yang Multicast connection capacity of WDM switching networks with limited wavelength conversion . . . . . . . . . 526--538 Timothy Y. Chow and Fabian Chudak and Anthony M. Ffrench Fast optical layer mesh protection using pre-cross-connected trails . . . . . . . 539--548 C. Y. Li and P. K. A. Wai and Victor O. K. Li The decomposition of a blocking model for connection-oriented networks . . . . 549--558 Yu-Chee Tseng and Yu-Chi Chueh and Jang-Ping Sheu Seamless channel transition for the staircase video broadcasting scheme . . 559--571 Yongtao Gong and Peiyuan Lee and Wanyi Gu Comments on ``Dynamic wavelength routing using congestion and neighborhood information'' . . . . . . . . . . . . . 572--572
Vijay K. Gurbani and Xian-He Sun Terminating telephony services on the Internet . . . . . . . . . . . . . . . . 571--581 Hani Jamjoom and Padmanabhan Pillai and Kang G. Shin Resynchronization and controllability of bursty service requests . . . . . . . . 582--594 Prince Samar and Marc R. Pearlman and Zygmunt J. Haas Independent zone routing: an adaptive hybrid routing framework for ad hoc wireless networks . . . . . . . . . . . 595--608 Jae-Hwan Chang and Leandros Tassiulas Maximum lifetime routing in wireless sensor networks . . . . . . . . . . . . 609--619 Natalija Vlajic and Charalambos D. Charalambous and Dimitrios Makrakis Performance aspects of data broadcast in wireless networks with user retrials . . 620--633 Özgür B. Akan and Ian F. Akyildiz ARC: the analytical rate control scheme for real-time traffic in wireless networks . . . . . . . . . . . . . . . . 634--644 Yiu Kwok Tham Scheduling satellite-switched time-division multiple access with general switching modes . . . . . . . . 645--652 Yan Sun and Wade Trappe and K. J. Ray Liu A scalable multicast key management scheme for heterogeneous wireless networks . . . . . . . . . . . . . . . . 653--666 Xi Zhang and Kang G. Shin Markov-chain modeling for multicast signaling delay analysis . . . . . . . . 667--680 Luciano Lenzini and Enzo Mingozzi and Giovanni Stea Tradeoffs between low complexity, low latency, and fairness with deficit round-robin schedulers . . . . . . . . . 681--693 Ao Tang and Jiantao Wang and Steven H. Low Understanding CHOKe: throughput and spatial characteristics . . . . . . . . 694--707 Zhili Zhao and Swaroop Darbha and A. L. Narasimha Reddy A method for estimating the proportion of nonresponsive traffic at a router . . 708--718 James Aweya and Michel Ouellette and Delfin Y. Montuno Design and stability analysis of a rate control algorithm using the Routh--Hurwitz stability criterion . . . 719--732 Jaudelice C. de Oliveira and Caterina Scoglio and Ian F. Akyildiz and George Uhl New preemption policies for DiffServ-aware traffic engineering to minimize rerouting in MPLS networks . . 733--745 Hanoch Levy and Tsippy Mendelson and Gilad Goren Dynamic allocation of resources to virtual path agents . . . . . . . . . . 746--758 Lachlan L. H. Andrew Fast simulation of wavelength continuous WDM networks . . . . . . . . . . . . . . 759--765
John W. Byers and Jeffrey Considine and Michael Mitzenmacher and Stanislav Rost Informed content delivery across adaptive overlay networks . . . . . . . 767--780 Ludmila Cherkasova and Minaxi Gupta Analysis of enterprise media server workloads: access patterns, locality, content evolution, and rates of change 781--794 Kamil Sarac and Kevin C. Almeroth Tracetree: a scalable mechanism to discover multicast tree topologies in the Internet . . . . . . . . . . . . . . 795--808 Ma\lgorzata Steinder and Adarshpal S. Sethi Probabilistic fault localization in communication systems using belief networks . . . . . . . . . . . . . . . . 809--822 Ruibing Hao and David Lee and Rakesh K. Sinha and Nancy Griffeth Integrated system interoperability testing with applications to VoIP . . . 823--836 Georgios Varsamopoulos and Sandeep K. S. Gupta Dynamically adapting registration areas to user mobility and call patterns for efficient location management in PCS networks . . . . . . . . . . . . . . . . 837--850 Piet Van Mieghem and Fernando A. Kuipers Concepts of exact QoS routing algorithms 851--864 Antonis Panagakis and Nandita Dukkipati and Ioannis Stavrakakis and Joy Kuri Optimal call admission control on a single link with a GPS scheduler . . . . 865--878 Taieb F. Znati and Rami Melhem Node delay assignment strategies to support end-to-end delay requirements in heterogeneous networks . . . . . . . . . 879--892 Dirceu Cavendish and Mario Gerla and Saverio Mascolo A control theoretical approach to congestion control in packet networks 893--906 Ioannis Ch. Paschalidis and Spyridon Vassilaras Importance sampling for the estimation of buffer overflow probabilities via trace-driven simulations . . . . . . . . 907--919 Eric Bouillet and Jean-François Labourdette Distributed computation of shared backup path in mesh optical networks using probabilistic methods . . . . . . . . . 920--930 Srinivasan Ramasubramanian and Arun K. Somani Analysis of optical networks with heterogeneous grooming architectures . . 931--943 Arun K. Somani and Mani Mina and Ling Li On trading wavelengths with fibers: a cost-performance based study . . . . . . 944--951 Cheng-Shang Chang and Zhen Liu A bandwidth sharing theory for a large number of HTTP-like connections . . . . 952--962
Constantinos Dovrolis and Parameswaran Ramanathan and David Moore Packet-dispersion techniques and a capacity-estimation methodology . . . . 963--977 N. G. Duffield and Francesco Lo Presti Network tomography from measured end-to-end delay covariance . . . . . . 978--992 Yuval Shavitt and Tomer Tankel Big-bang simulation for embedding network distances in Euclidean space . . 993--1006 Michael Rabinovich and Hua Wang DHTTP: an efficient and cache-friendly transfer protocol for the Web . . . . . 1007--1020 Ian F. Akyildiz and Wenye Wang The predictive user mobility profile framework for wireless multimedia networks . . . . . . . . . . . . . . . . 1021--1035 Hsiao-Hwa Chen and Wee-Teck Tea Hierarchy schedule-sensing protocol for CDMA wireless data-centric networks with multiple packet collision and capture effect . . . . . . . . . . . . . . . . . 1036--1048 Haiyun Luo and Jiejun Kong and Petros Zerfos and Songwu Lu and Lixia Zhang URSA: ubiquitous and robust access control for mobile ad hoc networks . . . 1049--1063 Yigal Bejerano Efficient integration of multihop wireless and wired networks with QoS constraints . . . . . . . . . . . . . . 1064--1078 Priya Ranjan and Eyad H. Abed and Richard J. La Nonlinear instabilities in TCP-RED . . . 1079--1092 Scott Jordan and Kalpana Jogi and Chunlin Shi and Ikhlaq Sidhu The variation of optimal bandwidth and buffer allocation with the number of sources . . . . . . . . . . . . . . . . 1093--1104 Pin-Han Ho and János Tapolcai and Tibor Cinkler Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels . . . . . . . . . . . 1105--1118 Hongsik Choi and Suresh Subramaniam and Hyeong-Ah Choi Loopback recovery from double-link failures in optical mesh networks . . . 1119--1130 Marco Ajmone Marsan and Mirko Franceschinis and Emilio Leonardi and Fabio Neri and Alessandro Tarello Underload instabilities in packet networks with flow schedulers . . . . . 1131--1143 Chuanxiong Guo SRR: an $ O(1) $ time-complexity packet scheduler for flows in multiservice packet networks . . . . . . . . . . . . 1144--1155 Guillermo del Angel and Terrence L. Fine Optimal power and retransmission control policies for random access systems . . . 1156--1166
Ellen W. Zegura Editorial . . . . . . . . . . . . . . . 1--1 Florin Baboescu and George Varghese Scalable packet classification . . . . . 2--14 Jun Xu and Richard J. Lipton On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms . . . . . . 15--28 David K. Y. Yau and John C. S. Lui and Feng Liang and Yeung Yam Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles . . 29--42 Fernando Paganini and Zhikui Wang and John C. Doyle and Steven H. Low Congestion control for high performance, stability, and fairness in general networks . . . . . . . . . . . . . . . . 43--56 Dongyu Qiu and Ness B. Shroff Queueing properties of feedback flow control systems . . . . . . . . . . . . 57--68 Yong Xia and David Harrison and Shivkumar Kalyanaraman and Kishore Ramachandran and Arvind Venkatesan Accumulation-based congestion control 69--80 Ashvin Lakshmikantha and Carolyn L. Beck and R. Srikant Robustness of real and virtual queue-based active queue management schemes . . . . . . . . . . . . . . . . 81--93 Andreas Pitsillides and Petros Ioannou and Marios Lestas and Loukas Rossides Adaptive nonlinear congestion controller for a differentiated-services framework 94--107 Aditya Karnik and Anurag Kumar Performance of TCP congestion control with explicit rate feedback . . . . . . 108--120 Saswati Sarkar and Leandros Tassiulas Fair distributed congestion control in multirate multicast networks . . . . . . 121--133 Wade Trappe and Yuke Wang and K. J. Ray Liu Resource-aware conference key establishment for heterogeneous networks 134--146 Li Li and Joseph Y. Halpern and Paramvir Bahl and Yi-Min Wang and Roger Wattenhofer A cone-based distributed topology-control algorithm for wireless multi-hop networks . . . . . . . . . . . 147--159 Guanglei Liu and Chuanyi Ji and Vincent W. S. Chan On the scalability of network management information for inter-domain light-path assessment . . . . . . . . . . . . . . . 160--172 Li-Wei Chen and Eytan Modiano Efficient routing and wavelength assignment for reconfigurable WDM ring networks with wavelength converters . . 173--186 Kejie Lu and Gaoxi Xiao and Imrich Chlamtac Analysis of blocking probability for distributed lightpath establishment in WDM optical networks . . . . . . . . . . 187--197 Yu Liu and David Tipper and Peerapon Siripongwutikorn Approximating optimal spare capacity allocation by successive survivable routing . . . . . . . . . . . . . . . . 198--211
Debasis Mitra and Qiong Wang Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management . . . . . . . 221--233 Ashwin Sridharan and Roch Guérin and Christophe Diot Achieving near-optimal traffic engineering solutions for current OSPF/IS-IS networks . . . . . . . . . . 234--247 Hervé Kerivin and Dritan Nace and Thi-Tuyet-Loan Pham Design of capacitated survivable networks with a single facility . . . . 248--261 Giuseppe Ascia and Vincenzo Catania and Daniela Panno An evolutionary management scheme in high-performance packet switches . . . . 262--275 Chengzhi Li and Edward W. Knightly Schedulability criterion and performance analysis of coordinated schedulers . . . 276--287 Ossama Younis and Sonia Fahmy FlowMate: scalable on-line flow clustering . . . . . . . . . . . . . . . 288--301 Supratim Deb and Ayalvadi Ganesh and Peter Key Resource allocation between persistent and transient flows . . . . . . . . . . 302--315 Marco Mellia and Michela Meo and Claudio Casetti TCP smart framing: a segmentation algorithm to reduce TCP latency . . . . 316--329 Nishanth R. Sastry and Simon S. Lam CYRF: a theory of window-based unicast congestion control . . . . . . . . . . . 330--342 Byung-Jae Kwak and Nah-Oak Song and Leonard E. Miller Performance analysis of exponential backoff . . . . . . . . . . . . . . . . 343--355 Eitan Altman and Konstantin Avrachenkov and Chadi Barakat A stochastic model of TCP/IP with stationary random losses . . . . . . . . 356--369 Ying Xu and Roch Guérin Individual QoS versus aggregate QoS: a loss performance study . . . . . . . . . 370--383 Weilian Su and Ian F. Akyildiz Time-diffusion synchronization protocol for wireless sensor networks . . . . . . 384--397 Taejoon Park and Kang G. Shin Optimal tradeoffs for location-based routing in large-scale ad hoc networks 398--410 Atilla Eryilmaz and R. Srikant and James R. Perkins Stable scheduling policies for fading wireless channels . . . . . . . . . . . 411--424 Olivier Dousse and François Baccelli and Patrick Thiran Impact of interferences on connectivity in ad hoc networks . . . . . . . . . . . 425--436 Eric Bouillet and Jean-François Labourdette and Ramu Ramamurthy and Sid Chaudhuri Lightpath re-optimization in mesh optical networks . . . . . . . . . . . . 437--447 Abel Dasylva and Delfin Y. Montuno and Prasad Kodaypak Optimization of optical cross-connects with wave-mixing conversion . . . . . . 448--458
Ellen W. Zegura Editorial . . . . . . . . . . . . . . . 461--461 David D. Clark and John Wroclawski and Karen R. Sollins and Robert Braden Tussle in cyberspace: defining tomorrow's Internet . . . . . . . . . . 462--475 Bong-Jun Ko and Dan Rubenstein Distributed self-stabilizing placement of replicated resources in emerging networks . . . . . . . . . . . . . . . . 476--487 Wu-chang Feng and Francis Chang and Wu-chi Feng and Jonathan Walpole A traffic characterization of popular on-line games . . . . . . . . . . . . . 488--500 Dan Rubenstein and Sambit Sahu Can unstructured P2P protocols survive flash crowds? . . . . . . . . . . . . . 501--512 Hyuk Lim and Jennifer C. Hou and Chong-Ho Choi Constructing Internet coordinate system based on delay measurement . . . . . . . 513--525 Do Young Eun and Ness B. Shroff Network decomposition: theory and practice . . . . . . . . . . . . . . . . 526--539 Homayoun Yousefi'zadeh and Hamid Jafarkhani and Amir Habibi Layered media multicast control (LMMC): rate allocation and partitioning . . . . 540--553 Ian F. Akyildiz and Özgür B. Akan and Giacomo Morabito A rate control scheme for adaptive real-time applications in IP networks with lossy links and long round trip times . . . . . . . . . . . . . . . . . 554--567 Milan Vojnovi\'c and Jean-Yves Le Boudec On the long-run behavior of equation-based rate control . . . . . . 568--581 Jiantao Wang and Lun Li and Steven H. Low and John C. Doyle Cross-layer optimization in TCP/IP networks . . . . . . . . . . . . . . . . 582--595 Saâd Biaz and Nitin H. Vaidya ``De-randomizing'' congestion losses to improve TCP performance over wired-wireless networks . . . . . . . . 596--608 Hongyi Wu and Chong Wang and Nian-Feng Tzeng Novel self-configurable positioning technique for multihop wireless networks 609--621 Pierre T. Kabamba and Semyon M. Meerkov and Choon Yik Tang Ranking and adaptive ranking CDMA . . . 622--635 Sem Borst User-level performance of channel-aware scheduling algorithms in wireless data networks . . . . . . . . . . . . . . . . 636--647 Yigal Bejerano and Yuri Breitbart and Ariel Orda and Rajeev Rastogi and Alexander Sprintson Algorithms for computing QoS paths with restoration . . . . . . . . . . . . . . 648--661 Anirban Chakrabarti and G. Manimaran Reliability constrained routing in QoS networks . . . . . . . . . . . . . . . . 662--675 Xiang Yu and Ian Li-Jin Thng and Yuming Jiang and Chunming Qiao Queueing processes in GPS and PGPS with LRD traffic inputs . . . . . . . . . . . 676--689 Anindya Basu and Girija Narlikar Fast incremental updates for pipelined forwarding engines . . . . . . . . . . . 690--703 Xiaowen Chu and Bo Li Dynamic routing and wavelength assignment in the presence of wavelength conversion for all-optical networks . . 704--715
Fernando A. Kuipers and Piet F. A. Van Mieghem Conditions that impact the complexity of QoS routing . . . . . . . . . . . . . . 717--730 Nicholas F. Maxemchuk and Iradj Ouveysi and Moshe Zukerman A quantitative measure for telecommunications networks topology design . . . . . . . . . . . . . . . . . 731--742 Yossi Chait and C. V. Hollot and Vishal Misra and Don Towsley and Honggang Zhang and Yong Cui Throughput differentiation using coloring at the network edge and preferential marking at the core . . . . 743--754 David E. Taylor and Andreas Herkersdorf and Andreas Döring and Gero Dittmann Robust header compression (ROHC) in next-generation network processors . . . 755--768 Mohammad J. Akhbarizadeh and Mehrdad Nourani Hardware-based IP routing using partitioned lookup table . . . . . . . . 769--781 Yashar Ganjali and Abtin Keshavarzian and Devavrat Shah Cell switching versus packet switching in input-queued switches . . . . . . . . 782--789 Weiguang Shi and M. H. MacGregor and Pawel Gburzynski Load balancing for parallel forwarding 790--801 Rama Sangireddy and Natsuhiko Futamura and Srinivas Aluru and Arun K. Somani Scalable, memory efficient, high-speed IP lookup algorithms . . . . . . . . . . 802--812 Xiaojun Lin and Ness B. Shroff Simplification of network dynamics in large systems . . . . . . . . . . . . . 813--826 Jang-Won Lee and Ravi R. Mazumdar and Ness B. Shroff Non-convex optimization and rate control for multi-class services in the Internet 827--840 François Baccelli and Dohy Hong Interaction of TCP flows as billiards 841--853 Jang-Won Lee and Ravi R. Mazumdar and Ness B. Shroff Downlink power allocation for multi-class wireless systems . . . . . . 854--867 Murali Kodialam and Thyaga Nandagopal Characterizing achievable rates in multi-hop wireless mesh networks with orthogonal channels . . . . . . . . . . 868--880 Sushant Sinha and C. Siva Ram Murthy Information theoretic approach to traffic adaptive WDM networks . . . . . 881--894 Poompat Saengudomlert and Eytan H. Modiano and Robert G. Gallager Dynamic wavelength assignment for WDM all-optical tree networks . . . . . . . 895--905 Jean-François Labourdette and Eric Bouillet and Ramu Ramamurthy and Ahmet A. Akyamaç Fast approximate dimensioning and performance analysis of mesh optical networks . . . . . . . . . . . . . . . . 906--917 Lu Shen and Xi Yang and Byrav Ramamurthy Shared risk link group (SRLG)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks . . . . . . . . . 918--931
Nick Duffield and Carsten Lund and Mikkel Thorup Estimating flow distributions from sampled flow statistics . . . . . . . . 933--946 Yin Zhang and Matthew Roughan and Carsten Lund and David L. Donoho Estimating point-to-point and point-to-multipoint traffic matrices: an information-theoretic approach . . . . . 947--960 Cliff C. Zou and Weibo Gong and Don Towsley and Lixin Gao The monitoring and early detection of Internet Worms . . . . . . . . . . . . . 961--974 Rong Pan and Balaji Prabhakar and Konstantinos Psounis and Damon Wischik SHRiNK: a method for enabling scaleable performance prediction and efficient network simulation . . . . . . . . . . . 975--988 Yuguang Fang Modeling and performance analysis for wireless mobile networks: a new analytical approach . . . . . . . . . . 989--1002 Özgür B. Akan and Ian F. Akyildiz Event-to-sink reliable transport in wireless sensor networks . . . . . . . . 1003--1016 Sarah Koskie and Zoran Gajic A Nash game algorithm for SIR-based power control in $3$G wireless CDMA networks . . . . . . . . . . . . . . . . 1017--1026 Clement Yuen and Peter Marbach Price-based rate control in random access networks . . . . . . . . . . . . 1027--1040 Youngmi Jin and George Kesidis Dynamics of usage-priced communication networks: the case of a single bottleneck resource . . . . . . . . . . 1041--1053 Yunkai Zhou and Harish Sethu On achieving fairness in the joint allocation of processing and bandwidth resources: principles and algorithms . . 1054--1067 Shao Liu and Tamer Ba\csar and R. Srikant Exponential-RED: a stabilizing AQM scheme for low- and high-speed TCP protocols . . . . . . . . . . . . . . . 1068--1081 Yu-Ping Tian Stability analysis and design of the second-order congestion control for networks with heterogeneous delays . . . 1082--1093 Yair Amir and Baruch Awerbuch and Claudiu Danilov and Jonathan Stanton A cost-benefit flow control for reliable multicast and unicast in overlay networks . . . . . . . . . . . . . . . . 1094--1106 Dmitri Loguinov and Juan Casas and Xiaoming Wang Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience . . . . . . . . . . 1107--1120 Hui Zhang and Ashish Goel and Ramesh Govindan Improving lookup latency in distributed hash table systems using random sampling 1121--1134 Xuehong Sun and Sartaj K. Sahni and Yiqiang Q. Zhao Packet classification consuming small amount of memory . . . . . . . . . . . . 1135--1145 Ariel Orda and Alexander Sprintson A scalable approach to the partition of QoS requirements in unicast and multicast . . . . . . . . . . . . . . . 1146--1159 João Luís Sobrinho An algebraic theory of dynamic network routing . . . . . . . . . . . . . . . . 1160--1173 Stavroula Siachalou and Leonidas Georgiadis Algorithms for precomputing constrained widest paths and multicast trees . . . . 1174--1187 Wei Sun and Kang G. Shin End-to-end delay bounds for traffic aggregates under guaranteed-rate scheduling algorithms . . . . . . . . . 1188--1201
David Alderson and Lun Li and Walter Willinger and John C. Doyle Understanding Internet topology: principles, models, and validation . . . 1205--1218 Graham Cormode and S. Muthukrishnan What's new: Finding significant differences in network data streams . . 1219--1232 Nan Jin and Gayathri Venkitachalam and Scott Jordan Dynamic congestion-based pricing of bandwidth and buffer . . . . . . . . . . 1233--1246 Haining Wang and Abhijit Bose and Mohamed El-Gendy and Kang G. Shin IP Easy-pass: a light-weight network-edge resource access control . . 1247--1260 Tansu Alpcan and Tamer Basar A globally stable adaptive congestion control scheme for Internet-style networks with delay . . . . . . . . . . 1261--1274 Steven Weber and Gustavo De Veciana Rate adaptive multimedia streams: optimization and admission control . . . 1275--1288 Marco Ajmone Marsan and Michele Garetto and Paolo Giaccone and Emilio Leonardi and Enrico Schiattarella and Alessandro Tarello Using partial differential equations to model TCP mice and elephants in large IP networks . . . . . . . . . . . . . . . . 1289--1301 Shengming Jiang and Dajiang He and Jianqiang Rao A prediction-based link availability estimation for routing metrics in MANETs 1302--1312 Ning Li and Jennifer C. Hou Localized topology control algorithms for heterogeneous wireless networks . . 1313--1324 Peter Marbach and Ying Qiu Cooperation in wireless ad hoc networks: a market-based approach . . . . . . . . 1325--1338 Seema Bandyopadhyay and Qingjiang Tian and Edward J. Coyle Spatio-temporal sampling rates and energy efficiency in wireless sensor networks . . . . . . . . . . . . . . . . 1339--1352 Haibin Lu and Sartaj Sahni Conflict detection and resolution in two-dimensional prefix router tables . . 1353--1363 Isaac Keslassy and Murali Kodialam and T. V. Lakshman and Dimitrios Stiliadis On guaranteed smooth scheduling for input-queued switches . . . . . . . . . 1364--1375 Shahrokh Valaee and Jean-Charles Grégoire An estimator of regulator parameters in a stochastic setting . . . . . . . . . . 1376--1389 Tao Wu and Arun K. Somani Cross-talk attack monitoring and localization in all-optical networks . . 1390--1401 Eric Rosenberg Hierarchical topological network design 1402--1409 Tzu-Lun Huang and D. T. Lee Comments and an improvement on ``A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks'' . . 1410--1411
Jang-Won Lee and Ravi R. Mazumdar and Ness B. Shroff Joint resource allocation and base-station assignment for the downlink in CDMA networks . . . . . . . . . . . . 1--14 Koushik Kar and Ananth Krishnamurthy and Neeraj Jaggi Dynamic node activation in networks of rechargeable sensors . . . . . . . . . . 15--26 Zygmunt J. Haas and Tara Small A new networking model for biological applications of ad hoc sensor networks 27--40 Razvan Cristescu and Baltasar Beferull-Lozano and Martin Vetterli and Roger Wattenhofer Network correlated data gathering with explicit communication: NP-completeness and algorithms . . . . . . . . . . . . . 41--54 Himanshu Gupta and Zongheng Zhou and Samir R. Das and Quinyi Gu Connected sensor cover: self-organization of sensor networks for efficient query execution . . . . . . . 55--67 Nicolas Hohn and Darryl Veitch Inverting sampled traffic . . . . . . . 68--80 John W. Byers and Gu-In Kwon and Michael Luby and Michael Mitzenmacher Fine-grained layered multicast with STAIR . . . . . . . . . . . . . . . . . 81--93 Priya Ranjan and Richard J. La and Eyad H. Abed Global stability conditions for rate control with arbitrary communication delays . . . . . . . . . . . . . . . . . 94--107 Peerapol Tinnakornsrisuphap and Richard J. La Asymptotic behavior of heterogeneous TCP flows and RED gateway . . . . . . . . . 108--120 Hyoung-Il Lee and Seung-Woo Seo Matching output queueing with a multiple input/output-queued switch . . . . . . . 121--132 Eveline Veloso and Virgílio Almeida and Wagner Meira, Jr. and Azer Bestavros and Shudong Jin A hierarchical characterization of a live streaming media workload . . . . . 133--146 Dahai Xu and Yang Chen and Yizhi Xiong and Chunming Qiao and Xin He On the complexity of and algorithms for finding the shortest path with a disjoint counterpart . . . . . . . . . . 147--158 Andrea Fumagalli and Marco Tacca Differentiated reliability (DiR) in wavelength division multiplexing rings 159--168 Jianping Wang and Xiangtong Qi and Biao Chen Wavelength assignment for multicast in all-optical WDM networks with splitting constraints . . . . . . . . . . . . . . 169--182 Ian Ferrel and Adrian Mettler and Edward Miller and Ran Libeskind-Hadas Virtual topologies for multicasting with multiple originators in WDM networks . . 183--190 Hiroaki Harai and Masayuki Murata High-speed buffer management for 40 Gb/s-based photonic packet switches . . 191--204 Hung Q. Ngo and Dazhen Pan and Chunming Qiao Constructions and analyses of nonblocking WDM switches based on arrayed waveguide grating and limited wavelength conversion . . . . . . . . . 205--217 Canhui Ou and Laxman H. Sahasrabuddhe and Keyao Zhu and Charles U. Martel and Biswanath Mukherjee Survivable virtual concatenation for data over SONET/SDH in optical transport networks . . . . . . . . . . . . . . . . 218--231
Suman Banerjee and Seungjoon Lee and Bobby Bhattacharjee and Aravind Srinivasan Resilient multicast using overlays . . . 237--248 Sergey Gorinsky and Sugat Jain and Harrick Vin and Yongguang Zhang Design of multicast protocols robust against inflated subscription . . . . . 249--262 Patrick P. C. Lee and John C. S. Lui and David K. Y. Yau Distributed collaborative key agreement and authentication protocols for dynamic peer groups . . . . . . . . . . . . . . 263--276 Hanoch Levy and Haim Zlatokrilov The effect of packet dispersion on voice applications in IP networks . . . . . . 277--288 John Musacchio and Jean Walrand WiFi access point pricing as a dynamic game . . . . . . . . . . . . . . . . . . 289--301 Xiaojun Lin and Ness B. Shroff The impact of imperfect scheduling on cross-layer congestion control in wireless networks . . . . . . . . . . . 302--315 Mehmet C. Vuran and Ian F. Akyildiz Spatial correlation-based collaborative medium access control in wireless sensor networks . . . . . . . . . . . . . . . . 316--329 Poompat Saengudomlert and Eytan Modiano and Robert G. Gallager On-line routing and wavelength assignment for dynamic traffic in WDM ring and torus networks . . . . . . . . 330--340 Zvi Rosberg and Andrew Zalesky and Moshe Zukerman Packet delay in optical circuit-switched networks . . . . . . . . . . . . . . . . 341--354 Ao Tang and Jiantao Wang and Steven H. Low Counter-intuitive throughput behaviors in networks under end-to-end control . . 355--368 Stephan Bohacek and Joao P. Hespanha and Junsoo Lee and Chansook Lim and Katia Obraczka A new TCP for persistent packet reordering . . . . . . . . . . . . . . . 369--382 Liangping Ma and Kenneth E. Barner and Gonzalo R. Arce Statistical analysis of TCP's retransmission timeout algorithm . . . . 383--396 Sarang Dharmapurikar and Praveen Krishnamurthy and David E. Taylor Longest prefix matching using Bloom filters . . . . . . . . . . . . . . . . 397--409 Hani Jamjoom and Kang G. Shin On the role and controllability of persistent clients in traffic aggregates 410--423 David Lee and Dongluo Chen and Ruibing Hao and Raymond E. Miller and Jianping Wu and Xia Yin Network protocol system monitoring: a formal approach with passive testing . . 424--437 Yigal Bejerano and Mark A. Smith and Joseph (Seffi) Naor and Nicole Immorlica Efficient location area planning for personal communication systems . . . . . 438--450 Zesheng Chen and Tian Bu and Mostafa Ammar and Don Towsley Comments on ``Modeling TCP Reno performance: a simple model and its empirical validation'' . . . . . . . . . 451--453
Matthias Grossglauser and Martin Vetterli Locating mobile nodes with EASE: learning efficient routes from encounter histories alone . . . . . . . . . . . . 457--469 Kin-Kwong Leung and Chi Wan Sung An opportunistic power control algorithm for cellular network . . . . . . . . . . 470--478 Zygmunt J. Haas and Joseph Y. Halpern and Li Li Gossip-based ad hoc routing . . . . . . 479--491 Guillermo Barrenetxea and Baltasar Berefull-Lozano and Martin Vetterli Lattice networks: capacity limits, optimal routing, and queueing behavior 492--505 Xin Wang and Henning Schulzrinne Pricing network resources for adaptive applications . . . . . . . . . . . . . . 506--519 Anish Arora and Hongwei Zhang LSRP: local stabilization in shortest path routing . . . . . . . . . . . . . . 520--531 Aman Shaikh and Rohit Dube and Anujan Varma Avoiding instability during graceful shutdown of multiple OSPF routers . . . 532--542 Luís Henrique M. K. Costa and Serge Fdida and Otto Carlos M. B. Duarte Incremental service deployment using the hop-by-hop multicast routing protocol 543--556 Danny Dolev and Osnat Mokryn and Yuval Shavitt On multicast trees: structure and size estimation . . . . . . . . . . . . . . . 557--567 Ayalvadi J. Ganesh and Peter B. Key and Damien Polis and R. Srikant Congestion notification and probing mechanisms for endpoint admission control . . . . . . . . . . . . . . . . 568--578 Lei Ying and Geir E. Dullerud and R. Srikant Global stability of Internet congestion controllers with heterogeneous delays 579--591 Richard W. Thommes and Mark J. Coates Deterministic packet marking for time-varying congestion price estimation 592--602 Ji-Cheol Moon and Byeong Gi Lee Rate-adaptive snoop: a TCP enhancement scheme over rate-controlled lossy links 603--615 Robert Shorten and Fabian Wirth and Douglas Leith A positive systems model of TCP-like congestion control: asymptotic results 616--629 Yuming Jiang Per-domain packet scale rate guarantee for expedited forwarding . . . . . . . . 630--643 Cheng-Shang Chang and Duan-Shin Lee and Chi-Yao Yue Providing guaranteed rate services in the load balanced Birkhoff--von Neumann switches . . . . . . . . . . . . . . . . 644--656 Yu Cheng and Weihua Zhuang Dynamic inter-SLA resource sharing in path-oriented differentiated services networks . . . . . . . . . . . . . . . . 657--670
Ning Cai and Mung Chiang and Michelle Effros and Ralf Koetter and Muriel Médard and Balaji Prabhakar and R. Srikant and Don Towsley and Raymond W. Yeung Introduction to the special issue on networking and information theory . . . 2285--2288 Feng Xue and P. R. Kumar On the $ \theta $-coverage and connectivity of large random networks 2289--2299 Florin Ciucu and Almut Burchard and Jörg Liebeherr Scaling properties of statistical end-to-end bounds in the network calculus . . . . . . . . . . . . . . . . 2300--2312 Liang-Liang Xie and P. R. Kumar On the path-loss attenuation regime for positive cost and linear scaling of transport capacity in wireless networks 2313--2328 Michael Katz and Shlomo Shamai Relaying protocols for two colocated users . . . . . . . . . . . . . . . . . 2329--2344 Nicholas J. A. Harvey and Robert Kleinberg and April Rasala Lehman On the capacity of information networks 2345--2364 Randall Dougherty and Chris Freiling and Kenneth Zeger Unachievability of network coding capacity . . . . . . . . . . . . . . . . 2365--2372 Xijin Yan and Jun Yang and Zhen Zhang An outer bound for multisource multisink network coding with minimum cost consideration . . . . . . . . . . . . . 2373--2385 Michael Langberg and Alexander Sprintson and Jehoshua Bruck The encoding complexity of network coding . . . . . . . . . . . . . . . . . 2386--2397 Yunnan Wu and Kamal Jain and Sun-Yuan Kung A unification of network coding and tree-packing (routing) theorems . . . . 2398--2409 Chandra Chekuri and Christina Fragouli and Emina Soljanin On average throughput and alphabet size in network coding . . . . . . . . . . . 2410--2424 Niranjan Ratnakar and Gerhard Kramer The multicast capacity of deterministic relay networks with no interference . . 2425--2432 Xue-Bin Liang Matrix games in the multicast networks: maximum information flows with network switching . . . . . . . . . . . . . . . 2433--2466 Zongpeng Li and Baochun Li and Lap Chi Lau On achieving maximum multicast throughput in undirected networks . . . 2467--2485 Supratim Deb and Muriel Médard and Clifford Choute Algebraic gossip: a network coding approach to optimal multiple rumor mongering . . . . . . . . . . . . . . . 2486--2507 Stephen Boyd and Arpita Ghosh and Balaji Prabhakar and Devavrat Shah Randomized gossip algorithms . . . . . . 2508--2530 Birsen Sirkeci-Mergen and Anna Scaglione and Gökhan Mergen Asymptotic analysis of multistage cooperative broadcast in wireless networks . . . . . . . . . . . . . . . . 2531--2550 Amin Shokrollahi Raptor codes . . . . . . . . . . . . . . 2551--2567 Abbas El Gamal and James Mammen and Balaji Prabhakar and Devavrat Shah Optimal throughput-delay scaling in wireless networks: part I: the fluid model . . . . . . . . . . . . . . . . . 2568--2592 Jie Luo and Anthony Ephremides On the throughput, capacity, and stability regions of random multiple access . . . . . . . . . . . . . . . . . 2593--2607 Desmond S. Lun and Niranjan Ratnakar and Muriel Médard and Ralf Koetter and David R. Karger and Tracey Ho and Ebad Ahmed and Fang Zhao Minimum-cost multicast over coded packet networks . . . . . . . . . . . . . . . . 2608--2623 Marcin Sikora and J. Nicholas Laneman and Martin Haenggi and Daniel J. Costello, Jr. and Thomas E. Fuja Bandwidth- and power-efficient routing in linear wireless networks . . . . . . 2624--2633 Gang Liang and Nina Taft and Bin Yu A fast lightweight approach to origin-destination IP traffic estimation using partial measurements . . . . . . . 2634--2648 Dragan Petrovi\'c and Kannan Ramchandran and Jan Rabaey Overcoming untuned radios in wireless networks with network coding . . . . . . 2649--2657 Peng-Jun Wan and Chih-Wei Yi Coverage by randomly deployed wireless sensor networks . . . . . . . . . . . . 2658--2669 Saikat Ray and Wei Lai and Ioannis Ch. Paschalidis Statistical location detection with sensor networks . . . . . . . . . . . . 2670--2683 Leonidas Georgiadis and Leandros Tassiulas Optimal overload response in sensor networks . . . . . . . . . . . . . . . . 2684--2696 Rajesh Sundaresan and Sergio Verdú Capacity of queues via point-process channels . . . . . . . . . . . . . . . . 2697--2709 Omer Gurewitz and Israel Cidon and Moshe Sidi One-way delay estimation using network-wide measurements . . . . . . . 2710--2724 An-Swol Hu and Sergio D. Servetto On the scalability of cooperative time synchronization in pulse-connected networks . . . . . . . . . . . . . . . . 2725--2748 Steven A. Borbash and Anthony Ephremides The feasibility of matchings in a wireless network . . . . . . . . . . . . 2749--2755 Olivier Dousse and Massimo Franceschetti and Patrick Thiran On the throughput scaling of wireless relay networks . . . . . . . . . . . . . 2756--2761 Ashish Khisti and Uri Erez and Gregory W. Wornell Fundamental limits and scaling behavior of cooperative multicasting in wireless networks . . . . . . . . . . . . . . . . 2762--2770 Sahand Haji Ali Ahmad and Aleksandar Jovi\vci\'c and Pramod Viswanath On outer bounds to the capacity region of wireless networks . . . . . . . . . . 2770--2776 Xiaojun Lin and Gaurav Sharma and Ravi R. Mazumdar and Ness B. Shroff Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility 2777--2784 Aditya Ramamoorthy and Kamal Jain and Philip A. Chou and Michelle Effros Separating distributed source coding from network coding . . . . . . . . . . 2785--2795 Ángela I. Barbero and Òyvind Ytrehus Cycle-logical treatment for ``Cyclopathic'' networks . . . . . . . . 2795--2804 Kamal Jain and Vijay V. Vazirani and Gideon Yuval On the capacity of multiple unicast sessions in undirected graphs . . . . . 2805--2809 Alexandros G. Dimakis and Vinod Prabhakaran and Kannan Ramchandran Decentralized erasure codes for distributed networked storage . . . . . 2809--2816 Razvan Cristescu and Baltasar Beferull-Lozano Lossy network correlated data gathering with high-resolution coding . . . . . . 2817--2824 Yitzhak Birk and Tomer Kol Coding on demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients . . . . . . . . . . . . . . . . 2825--2830 Massimo Franceschetti and Ronald Meester Critical node lifetimes in random networks via the Chen-Stein method . . . 2831--2837 Cheng-Shang Chang and Yi-Ting Chen and Duan-Shin Lee Constructions of optical FIFO queues . . 2838--2843
Don Towsley Editorial . . . . . . . . . . . . . . . 673--673 Ning Cai and Mung Chiang and Michelle Effros and Ralf Koetter and Muriel Médard and Balaji Prabhakar and R. Srikant and Don Towsley and Raymond W. Yeung Introduction to the special issue on networking and information theory . . . 674--674 Don Towsley Abstracts from the IEEE transactions on information theory, special issue, June 2006 . . . . . . . . . . . . . . . . . . 675--682 Aleksandar Kuzmanovic and Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies . . . . . 683--696 Nick Duffield and Francesco Lo Presti and Vern Paxson and Don Towsley Network loss tomography using striped unicast probes . . . . . . . . . . . . . 697--710 David Breitgand and Danny Raz and Yuval Shavitt The traveling miser problem . . . . . . 711--724 Lili Qiu and Yang Richard Yang and Yin Zhang and Scott Shenker On selfish routing in Internet-like environments . . . . . . . . . . . . . . 725--738 Aleksandar Kuzmanovic and Edward W. Knightly TCP-LP: low-priority service via end-point congestion control . . . . . . 739--752 Jing Zhu and Sumit Roy and Jae H. Kim Performance modelling of TCP enhancements in terrestrial-satellite hybrid networks . . . . . . . . . . . . 753--766 Martin Karsten Collected experience from implementing RSVP . . . . . . . . . . . . . . . . . . 767--778 Xinming He and Christos Papadopoulos and Pavlin Radoslavov Incremental deployment strategies for router-assisted reliable multicast . . . 779--792 Sunil Kulkarni and Aravind Iyer and Catherine Rosenberg An address-light, integrated MAC and routing protocol for wireless sensor networks . . . . . . . . . . . . . . . . 793--806 Zi-Tsan Chou and Ching-Chi Hsu and Shin-Neng Hsu UPCF: a new point coordination function with QoS and power management for multimedia over wireless LANs . . . . . 807--820 Lih-feng Tsaur and Daniel C. Lee Closed-loop architecture and protocols for rapid dynamic spreading gain adaptation in CDMA networks . . . . . . 821--834 Prasanna Chaporkar and Saswati Sarkar and Rahul Shetty Dynamic quorum policy for maximizing throughput in limited information multiparty MAC . . . . . . . . . . . . . 835--848 Yigal Bejerano and Randeep S. Bhatia MiFi: a framework for fairness and QoS assurance for current IEEE 802.11 networks with multiple access points . . 849--862 Kai Zheng and Chengchen Hu and Hongbin Lu and Bin Liu A TCAM-based distributed parallel IP lookup scheme and performance analysis 863--875 Omer Gurewitz and Israel Cidon and Moshe Sidi Network classless time protocol based on clock offset optimization . . . . . . . 876--888 Hassan Naser and Hussein T. Mouftah A joint-ONU interval-based dynamic scheduling algorithm for Ethernet passive optical networks . . . . . . . . 889--899 Daniel O. Awduche and Bijan Jabbari Demand assigned capacity management (DACM) in IP over optical (IPO) networks 900--913 Weifa Liang and Xiaojun Shen A general approach for all-to-all routing in multihop WDM optical networks 914--923
Cristian Estan and George Varghese and Michael Fisk Bitmap algorithms for counting active flows on high-speed links . . . . . . . 925--937 Yung Yi and Supratim Deb and Sanjay Shakkottai Time-scale decomposition and equivalent rate-based marking . . . . . . . . . . . 938--950 Janardhan R. Iyengar and Paul D. Amer and Randall Stewart Concurrent multipath transfer using SCTP multihoming over independent end-to-end paths . . . . . . . . . . . . . . . . . 951--964 Yaqing Huang and Roch Guérin and Pranav Gupta Supporting excess real-time traffic with active drop queue . . . . . . . . . . . 965--977 Richard T. B. Ma and Sam C. M. Lee and John C. S. Lui and David K. Y. Yau Incentive and service differentiation in P2P networks: a game theoretic approach 978--991 Patrick Maillé and Bruno Tuffin Pricing the Internet with multibid auctions . . . . . . . . . . . . . . . . 992--1004 Vinay J. Ribeiro and Rudolf H. Riedi and Richard G. Baraniuk Multiscale queueing analysis . . . . . . 1005--1018 Nedo Celandroni and Franco Davoli and Erina Ferro and Alberto Gotta Long-lived TCP connections via satellite: cross-layer bandwidth allocation, pricing, and adaptive control . . . . . . . . . . . . . . . . 1019--1030 Tarik Taleb and Nei Kato and Yoshiaki Nemoto REFWA: an efficient and fair congestion control scheme for LEO satellite networks . . . . . . . . . . . . . . . . 1031--1044 Pavan Nuggehalli and Vikram Srinivasan and Carla-Fabiana Chiasserini and Ramesh R. Rao Efficient cache placement in multi-hop wireless networks . . . . . . . . . . . 1045--1055 Iordanis Koutsopoulos and Leandros Tassiulas Cross-layer adaptive techniques for throughput enhancement in wireless OFDM-based networks . . . . . . . . . . 1056--1066 Matthew Andrews and Lisa Zhang Scheduling over nonstationary wireless channels with finite rate sets . . . . . 1067--1077 Wee-Seng Soh and Hyong S. Kim A predictive bandwidth reservation scheme using mobile positioning and road topology information . . . . . . . . . . 1078--1091 Yigal Bejerano and Rajeev Rastogi Robust monitoring of link delays and faults in IP networks . . . . . . . . . 1092--1103 Narendra K. Singhal and Laxman H. Sahasrabuddhe and Biswanath Mukherjee Optimal multicasting of multiple light-trees of different bandwidth granularities in a WDM mesh network with sparse splitting capabilities . . . . . 1104--1117 Zvi Rosberg and Andrew Zalesky and Hai L. Vu and Moshe Zukerman Analysis of OBS networks with limited wavelength conversion . . . . . . . . . 1118--1127 Yinian Mao and Yan Sun and Min Wu and K. J. Ray Liu JET: dynamic join-exit-tree amortization and scheduling for contributory key management . . . . . . . . . . . . . . . 1128--1140 Frank K. Hwang and Wen-Dar Lin and Vadim Lioubimov On noninterruptive rearrangeable networks . . . . . . . . . . . . . . . . 1141--1149 Guillermo Barrenetxea and Baltasar Beferull-Lozano and Martin Vetterli Correction to `Lattice networks: Capacity limits, optimal routing, and queueing behavior' . . . . . . . . . . . 1150--1150
Jean-Yves Le Boudec and Milan Vojnovic The random trip model: stability, stationary regime, and perfect simulation . . . . . . . . . . . . . . . 1153--1166 Jerzy Konorski A game-theoretic study of CSMA/CA under a backoff attack . . . . . . . . . . . . 1167--1178 Chun-Ting Chou and Kang G. Shin and Sai Shankar N. Contention-based airtime usage control in multirate IEEE 802.11 wireless LANs 1179--1192 David Applegate and Edith Cohen Making routing robust to changing traffic demands: algorithms and evaluation . . . . . . . . . . . . . . . 1193--1206 Eddie Kohler and Jinyang Li and Vern Paxson and Scott Shenker Observed structure of addresses in IP traffic . . . . . . . . . . . . . . . . 1207--1218 Bamba Gueye and Artur Ziviani and Mark Crovella and Serge Fdida Constraint-based geolocation of Internet hosts . . . . . . . . . . . . . . . . . 1219--1232 Srinivas Shakkottai and R. Srikant Economics of network pricing with multiple ISPs . . . . . . . . . . . . . 1233--1245 David X. Wei and Cheng Jin and Steven H. Low and Sanjay Hegde FAST TCP: motivation, architecture, algorithms, performance . . . . . . . . 1246--1259 Huaizhong Han and Srinivas Shakkottai and C. V. Hollot and R. Srikant and Don Towsley Multi-path TCP: a joint congestion control and routing scheme to exploit path diversity in the Internet . . . . . 1260--1271 Dritan Nace and Nhat-Linh Doan and Eric Gourdin and Bernard Liau Computing optimal max-min fair resource allocation for elastic flows . . . . . . 1272--1281 Wei-Hua Wang and Marimuthu Palaniswami and Steven H. Low Application-oriented flow control: fundamentals, algorithms and fairness 1282--1291 Anthony C. Boucouvalas and Pi Huang OBEX over IrDA: performance analysis and optimization by considering multiple applications . . . . . . . . . . . . . . 1292--1301 Jacob Chakareski and Philip A. Chou RaDiO edge: rate-distortion optimized proxy-driven streaming from the network edge . . . . . . . . . . . . . . . . . . 1302--1312 Xingzhe Fan and Kartikeya Chandrayana and Murat Arcak and Shivkumar Kalyanaraman and John Ting-Yung Wen A two-time-scale design for edge-based detection and rectification of uncooperative flows . . . . . . . . . . 1313--1322 Feng Xie and Gang Feng and Chee Kheong Siew The impact of loss recovery on congestion control for reliable multicast . . . . . . . . . . . . . . . 1323--1335 Dean H. Lorenz and Ariel Orda and Danny Raz and Yuval Shavitt Efficient QoS partition and routing of unicast and multicast . . . . . . . . . 1336--1347 Xiaojun Lin and Ness B. Shroff An optimization-based approach for QoS routing in high-bandwidth networks . . . 1348--1361 Sriram Ramabhadran and Joseph Pasquale The Stratified Round Robin scheduler: design, analysis and implementation . . 1362--1373 Michael Rosenblum and Constantine Caramanis and Michel X. Goemans and Vahid Tarokh Approximating fluid schedules in crossbar packet-switches and Banyan networks . . . . . . . . . . . . . . . . 1374--1387 Maher Ali Generalized sharing in survivable optical networks . . . . . . . . . . . . 1388--1399
Nathaniel E. Baughman and Marc Liberatore and Brian Neil Levine Cheat-proof playout for centralized and peer-to-peer gaming . . . . . . . . . . 1--13 Ramana Rao Kompella and Sumeet Singh and George Varghese On scalable attack detection in the network . . . . . . . . . . . . . . . . 14--25 Ramaswamy Ramaswamy and Tilman Wolf High-speed prefix-preserving IP address anonymization for passive measurement systems . . . . . . . . . . . . . . . . 26--39 Haining Wang and Cheng Jin and Kang G. Shin Defense against spoofed IP traffic using hop-count filtering . . . . . . . . . . 40--53 Sharad Jaiswal and Gianluca Iannaccone and Christophe Diot and Jim Kurose and Don Towsley Measurement and classification of out-of-sequence packets in a Tier-1 IP backbone . . . . . . . . . . . . . . . . 54--66 Dogu Arifler and Gustavo de Veciana and Brian L. Evans A factor analytic approach to inferring congestion sharing based on flow level measurements . . . . . . . . . . . . . . 67--79 Caixia Chi and Dawei Huang and David Lee and XiaoRong Sun Lazy flooding: a new technique for information dissemination in distributed network systems . . . . . . . . . . . . 80--92 Seung Jun Baek and Gustavo De Veciana Spatial energy balancing through proactive multipath routing in wireless multihop networks . . . . . . . . . . . 93--104 Ioannis Ch. Paschalidis and Wei Lai and David Starobinski Asymptotically optimal transmission policies for large-scale low-power wireless sensor networks . . . . . . . . 105--118 Jakob Eriksson and Michalis Faloutsos and Srikanth V. Krishnamurthy DART: dynamic address routing for scalable ad hoc and mesh networks . . . 119--132 Yung Yi and Sanjay Shakkottai Hop-by-hop congestion control over a wireless multi-hop network . . . . . . . 133--144 Liang Song and Dimitrios Hatzinakos A cross-layer architecture of wireless sensor networks for target tracking . . 145--158 David Malone and Ken Duffy and Doug Leith Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions . . . . . . . . 159--172 Zongming Fei and Mengkun Yang A proactive tree recovery mechanism for resilient overlay multicast . . . . . . 173--186 Seong-Ryong Kang and Dmitri Loguinov Modeling best-effort and FEC streaming of scalable video in lossy network channels . . . . . . . . . . . . . . . . 187--200 Guoliang Xue and Arunabha Sen and Weiyi Zhang and Jian Tang and Krishnaiya Thulasiraman Finding a path subject to many additive QoS constraints . . . . . . . . . . . . 201--211 Yong Lee and Jianyu Lou and Junzhou Luo and Xiaojun Shen An efficient packet scheduling algorithm with deadline guarantees for input-queued switches . . . . . . . . . 212--225 Ayman G. Fayoumi and Anura P. Jayasumana A surjective-mapping based model for optical shared-buffer cross-connect . . 226--233 Zhenghao Zhang and Yuanyuan Yang On-line optimal wavelength assignment in WDM networks with shared wavelength converter pool . . . . . . . . . . . . . 234--245
Nick Feamster and Jennifer Rexford Network-wide prediction of BGP routes 253--266 Giuseppe Di Battista and Thomas Erlebach and Alexander Hall and Maurizio Patrignani and Maurizio Pizzonia and Thomas Schank Computing the types of the relationships between autonomous systems . . . . . . . 267--280 Ping Ji and Zihui Ge and Jim Kurose and Don Towsley A comparison of hard-state and soft-state signaling protocols . . . . . 281--294 Predrag R. Jelenkovi\'c and Petar Mom\vcilovi\'c and Mark S. Squillante Scalability of wireless networks . . . . 295--308 Ping Chung Ng and Soung Chang Liew Throughput analysis of IEEE802.11 multi-hop ad hoc networks . . . . . . . 309--322 Gennaro Boggia and Pietro Camarda and Luigi Alfredo Grieco and Saverio Mascolo Feedback-based control for providing real-time services with the 802.11e MAC 323--333 Hai Liu and Xiaohua Jia and Peng-Jun Wan and Chih-Wei Yi and S. Kami Makki and Niki Pissinou Maximizing lifetime of sensor surveillance systems . . . . . . . . . . 334--345 Seyit A. Çamtepe and Bülent Yener Combinatorial design of key distribution mechanisms for wireless sensor networks 346--358 Srihari Nelakuditi and Sanghwan Lee and Yinzhe Yu and Zhi-Li Zhang and Chen-Nee Chuah Fast local rerouting for handling transient link failures . . . . . . . . 359--372 Sonia Fahmy and Minseok Kwon Characterizing overlay multicast networks and their costs . . . . . . . . 373--386 Marjan Bozinovski and Hans P. Schwefel and Ramjee Prasad Maximum availability server selection policy for efficient and reliable session control systems . . . . . . . . 387--399 Mansoor Alicherry and Randeep Bhatia Simple pre-provisioning scheme to enable fast restoration . . . . . . . . . . . . 400--412 Ron Banner and Ariel Orda Multipath routing algorithms for congestion minimization . . . . . . . . 413--424 Alexandre O. Stauffer and Valmir C. Barbosa Probabilistic heuristics for disseminating information in networks 425--435 Nicholas B. Chang and Mingyan Liu Controlled flooding search in a large network . . . . . . . . . . . . . . . . 436--449 Aggelos Ioannou and Manolis G. H. Katevenis Pipelined heap (priority queue) management for advanced scheduling in high-speed networks . . . . . . . . . . 450--461 Haibin Lu and Sartaj Sahni $ O(\log W) $ multidimensional packet classification . . . . . . . . . . . . . 462--472 Eli Brosh and Asaf Levin and Yuval Shavitt Approximation and heuristic algorithms for minimum-delay application-layer multicast trees . . . . . . . . . . . . 473--484
Augustin Soule and Antonio Nucci and Rene L. Cruz and Emilio Leonardi and Nina Taft Estimating dynamic traffic matrices by using viable routing changes . . . . . . 485--498 David E. Taylor and Jonathan S. Turner ClassBench: a packet classification benchmark . . . . . . . . . . . . . . . 499--511 Mortada Mehyar and Demetri Spanos and John Pongsajapan and Steven H. Low and Richard M. Murray Asynchronous distributed averaging on communication networks . . . . . . . . . 512--520 Iordanis Koutsopoulos and Leandros Tassiulas Joint optimal access point selection and channel assignment in wireless networks 521--532 Ashutosh Sabharwal and Ahmad Khoshnevis and Edward Knightly Opportunistic spectral usage: bounds and a multi-band CSMA/CA protocol . . . . . 533--545 Karthikeyan Sundaresan and Raghupathy Sivakumar A unified MAC layer framework for ad-hoc networks with smart antennas . . . . . . 546--559 Yigal Bejerano and Seung-Jae Han and Li Li Fairness and load balancing in wireless LANs using association control . . . . . 560--573 Mehmet C. Vuran and Ian F. Akyildiz A-MAC: adaptive medium access control for next generation wireless terminals 574--587 Anurag Kumar and Eitan Altman and Daniele Miorandi and Munish Goyal New insights from a fixed-point analysis of single cell IEEE 802.11 WLANs . . . . 588--601 Denizhan N. Alparslan and Khosrow Sohraby A generalized random mobility model for wireless ad hoc networks and its analysis: one-dimensional case . . . . . 602--615 Denizhan N. Alparslan and Khosrow Sohraby Two-dimensional modeling and analysis of generalized random mobility models for wireless ad hoc networks . . . . . . . . 616--629 Junsoo Lee and Stephan Bohacek and João P. Hespanha and Katia Obraczka Modeling communication networks with hybrid systems . . . . . . . . . . . . . 630--643 Derek Leonard and Zhongmei Yao and Vivek Rai and Dmitri Loguinov On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks . . . . . . . . . 644--656 Michael J. Neely and Eytan Modiano and Yuan-Sheng Cheng Logarithmic delay for $ N \times N $ packet switches under the crossbar constraint . . . . . . . . . . . . . . . 657--668 Nicolas Christin and Jörg Liebeherr and Tarek Abdelzaher Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms . . . 669--682 Balaji Krithikaivasan and Yong Zeng and Kaushik Deka and Deep Medhi ARCH-based traffic forecasting and dynamic bandwidth provisioning for periodically measured nonstationary traffic . . . . . . . . . . . . . . . . 683--696 Cheng Chen and Zheng Guo Li and Yeng Chai Soh MRF: a framework for source and destination based bandwidth differentiation service . . . . . . . . 697--708 Massimo Tornatore and Guido Maier and Achille Pattavina WDM network design by ILP models based on flow aggregation . . . . . . . . . . 709--720 Chunsheng Xin Blocking analysis of dynamic traffic grooming in mesh WDM optical networks 721--733
Ron Banner and Ariel Orda The power of tuning: a novel approach for the efficient design of survivable networks . . . . . . . . . . . . . . . . 737--749 Kwok Shing Ho and Kwok Wai Cheung Generalized survivable network . . . . . 750--760 Renata Teixeira and Timothy G. Griffin and Mauricio G. C. Resende and Jennifer Rexford TIE breaking: tunable interdomain egress selection . . . . . . . . . . . . . . . 761--774 Xiaowei Yang and David Clark and Arthur W. Berger NIRA: a new inter-domain routing architecture . . . . . . . . . . . . . . 775--788 Antonio Nucci and Supratik Bhattacharyya and Nina Taft and Christophe Diot IGP link weight assignment for operational Tier-1 backbones . . . . . . 789--802 Smita Rai and Omkar Deshpande and Canhui Ou and Charles U. Martel and Biswanath Mukherjee Reliable multipath provisioning for high-capacity backbone mesh networks . . 803--812 Bernardo A. Movsichoff and Constantino M. Lagoa and Hao Che End-to-end optimal algorithms for integrated QoS, traffic engineering, and failure recovery . . . . . . . . . . . . 813--823 Ao Tang and Jiantao Wang and Steven H. Low and Mung Chiang Equilibrium of heterogeneous congestion control: existence and uniqueness . . . 824--837 Yueping Zhang and Seong-Ryong Kang and Dmitri Loguinov Delay-independent stability and performance of distributed congestion control . . . . . . . . . . . . . . . . 838--851 Injong Rhee and Lisong Xu Limitations of equation-based congestion control . . . . . . . . . . . . . . . . 852--865 Robert N. Shorten and Douglas J. Leith On queue provisioning, network efficiency and the transmission control protocol . . . . . . . . . . . . . . . . 866--877 Yanping Zhao and Derek L. Eager and Mary K. Vernon Network bandwidth requirements for scalable on-demand streaming . . . . . . 878--891 Xiaoming Wang and Dmitri Loguinov Load-balancing performance of consistent hashing: asymptotic analysis of random node join . . . . . . . . . . . . . . . 892--905 Pi-Chung Wang and Chun-Liang Lee and Chia-Tai Chan and Hung-Yi Chang Performance improvement of two-dimensional packet classification by filter rephrasing . . . . . . . . . . . 906--917 Xiliang Liu and Kaliappa Ravindran and Dmitri Loguinov A queueing-theoretic foundation of available bandwidth estimation: single-hop analysis . . . . . . . . . . 918--931 Reuven Cohen and Liran Katzir A generic quantitative approach to the scheduling of synchronous packets in a shared uplink wireless channel . . . . . 932--943 Gábor Fodor and Miklós Telek Bounding the blocking probabilities in multirate CDMA networks supporting elastic services . . . . . . . . . . . . 944--956 Xiaojun Cao and Vishal Anand and Chunming Qiao Waveband switching for dynamic traffic demands in multigranular optical networks . . . . . . . . . . . . . . . . 957--968 Hung Q. Ngo and Dazhen Pan and Yuanyuan Yang Optical switching networks with minimum number of limited-range wavelength converters . . . . . . . . . . . . . . . 969--979
Gaurav Sharma and Ravi Mazumdar and Ness B. Shroff Delay and capacity trade-offs in mobile ad hoc networks: a global perspective 981--992 Richard J. La and Yijie Han Distribution of path durations in mobile ad hoc networks and path selection . . . 993--1006 Daji Qiao and Sunghyun Choi and Kang G. Shin Interference analysis and transmit power control in IEEE 802.11a/h wireless LANs 1007--1020 Longbi Lin and Ness B. Shroff and R. Srikant Asymptotically optimal energy-aware routing for multihop wireless networks with renewable energy sources . . . . . 1021--1034 Aditya Karnik and Anurag Kumar Distributed optimal self-organization in ad hoc wireless sensor networks . . . . 1035--1045 Shailesh Patil and Gustavo De Veciana Managing resources and quality of service in heterogeneous wireless systems exploiting opportunism . . . . . 1046--1058 Robert Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Yin Zhang and Peter A. Dinda and Ming-Yang Kao and Gokhan Memik Reversible sketches: enabling monitoring and analysis over high-speed data streams . . . . . . . . . . . . . . . . 1059--1072 Bozidar Radunovi\'c and Jean-Yves Le Boudec A unified framework for max-min and min-max fairness with applications . . . 1073--1083 Yan Chen and David Bindel and Han Hee Song and Randy H. Katz Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications . . . . . . . . . . . . . . 1084--1097 Yasong Jin and Soshant Bali and Tyrone E. Duncan and Victor S. Frost Predicting properties of congestion events for a queueing system with fBm traffic . . . . . . . . . . . . . . . . 1098--1108 Yee-Ting Li and Douglas Leith and Robert N. Shorten Experimental evaluation of TCP protocols for high-speed networks . . . . . . . . 1109--1122 Olivier Bonaventure and Clarence Filsfils and Pierre François Achieving sub-50 milliseconds recovery upon BGP peering link failures . . . . . 1123--1135 Anton Riedl and Dominic A. Schupke Routing optimization in IP networks utilizing additive and concave link metrics . . . . . . . . . . . . . . . . 1136--1148 Yanping Zhao and Derek L. Eager and Mary K. Vernon Scalable on-demand streaming of nonlinear media . . . . . . . . . . . . 1149--1162 Jikai Li and Chunming Qiao and Jinhui Xu and Dahai Xu Maximizing throughput for optical burst switching networks . . . . . . . . . . . 1163--1176 Jing Zhang and Keyao Zhu and Hui Zang and Norman S. Matloff and Biswanath Mukherjee Availability-aware provisioning strategies for differentiated protection services in wavelength-convertible WDM mesh networks . . . . . . . . . . . . . 1177--1190 Zhenghao Zhang and Yuanyuan Yang A novel analytical model for switches with shared buffer . . . . . . . . . . . 1191--1203 Dijiang Huang and Manish Mehta and Appie van de Liefvoort and Deep Medhi Modeling pairwise key establishment for random key predistribution in large-scale sensor networks . . . . . . 1204--1215
Long Le and Jay Aikat and Kevin Jeffay and F. Donelson Smith The effects of active queue management and explicit congestion notification on Web performance . . . . . . . . . . . . 1217--1230 Thomas Voice Stability of multi-path dual congestion control algorithms . . . . . . . . . . . 1231--1239 Prashanth Hande and Shengyu Zhang and Mung Chiang Distributed rate allocation for inelastic flows . . . . . . . . . . . . 1240--1253 Patrick G. Bridges and Gary T. Wong and Matti Hiltunen and Richard D. Schlichting and Matthew J. Barrick A configurable and extensible transport protocol . . . . . . . . . . . . . . . . 1254--1265 Nick Feamster and Ramesh Johari and Hari Balakrishnan Implications of autonomy for the expressiveness of policy routing . . . . 1266--1279 Pierre François and Olivier Bonaventure Avoiding transient loops during the convergence of link-state routing protocols . . . . . . . . . . . . . . . 1280--1292 Gábor Rétvári and József J. Bíró and Tibor Cinkler On shortest path representation . . . . 1293--1306 Jin Xiao and Raouf Boutaba Assessing network service profitability: modeling from market science perspective 1307--1320 Amos Beimel and Shlomi Dolev and Noam Singer RT oblivious erasure correcting . . . . 1321--1332 Atilla Eryilmaz and R. Srikant Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control . . . 1333--1344 Mohammad Taghi Hajiaghayi and Nicole Immorlica and Vahab S. Mirrokni Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks . . . . . . . . . . . 1345--1358 Ritesh Madan and Shuguang Cui and Sanjay Lall and Andrea J. Goldsmith Modeling and optimization of transmission schemes in energy-constrained wireless sensor networks . . . . . . . . . . . . . . . . 1359--1372 Yaling Yang and Jun Wang and Robin Kravets Distributed optimal contention window control for elastic traffic in single-cell wireless LANs . . . . . . . 1373--1386 Xiangying Yang and Gustavo De Veciana Inducing multiscale clustering using multistage MAC contention in CDMA ad hoc networks . . . . . . . . . . . . . . . . 1387--1400 Huiyu Luo and Gregory J. Pottie Designing routes for source coding with explicit side information in sensor networks . . . . . . . . . . . . . . . . 1401--1413 Sandro Bosio and Antonio Capone and Matteo Cesana Radio planning of wireless local area networks . . . . . . . . . . . . . . . . 1414--1427 Satish Raghunath and K. K. Ramakrishnan and Shivkumar Kalyanaraman Measurement-based characterization of IP VPNs . . . . . . . . . . . . . . . . . . 1428--1441 Chengzhi Li and Almut Burchard and Jörg Liebeherr A network calculus with effective bandwidth . . . . . . . . . . . . . . . 1442--1453 Paolo Valente Exact GPS simulation and optimal fair scheduling with logarithmic complexity 1454--1466 Fang Hao and Murali Kodialam and T. V. Lakshman and Shantidev Mohanty Fast, memory efficient flow rate estimation using runs . . . . . . . . . 1467--1477 Jie Lian and Kshirasagar Naik and Gordon B. Agnew A framework for evaluating the performance of cluster algorithms for hierarchical networks . . . . . . . . . 1478--1489 Patrick P. C. Lee and Vishal Misra and Dan Rubenstein Distributed algorithms for secure multipath routing in attack-resistant networks . . . . . . . . . . . . . . . . 1490--1501 Heng Yin and Haining Wang Building an application-aware IPsec policy system . . . . . . . . . . . . . 1502--1513 Yan Sun and K. J. Ray Liu Hierarchical group access control for secure multicast communications . . . . 1514--1526 Javier Salido and Loukas Lazos and Radha Poovendran Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach . . . . 1527--1540 Emilio Leonardi and Marco Mellia and Marco Ajmone Marsan and Fabio Neri Optimal scheduling and routing for maximum network throughput . . . . . . . 1541--1554 Olufemi Komolafe and David Harle An holistic framework for regular virtual topology design . . . . . . . . 1555--1564 Haitham S. Hamza and Jitender S. Deogun WDM optical interconnects: a balanced design approach . . . . . . . . . . . . 1565--1578 Piotr Cho\lda and Andrzej Jajszczyk Reliability assessment of optical p-cycles . . . . . . . . . . . . . . . . 1579--1592 Mordechai Shalom and Shmuel Zaks A $ 10 / 7 + \epsilon $ approximation for minimizing the number of ADMs in SONET rings . . . . . . . . . . . . . . 1593--1602 François Abel and Cyriel Minkenberg and Ilias Iliadis and Ton Engbersen and Mitchell Gusat and Ferdinand Gramsamer and Ronald P. Luijten Design issues in next-generation merchant switch fabrics . . . . . . . . 1603--1615 Hongbin Luo and Hongfang Yu and Lemin Li Comments on `Segment shared protection in mesh communication networks with bandwidth guaranteed tunnels' . . . . . 1616--1616
Ram Keralapura and Chen-Nee Chuah and Nina Taft and Gianluca Iannaccone Race conditions in coexisting overlay networks . . . . . . . . . . . . . . . . 1--14 Michael T. Goodrich Probabilistic packet marking for large-scale IP traceback . . . . . . . . 15--24 Yuval Shavitt and Tomer Tankel Hyperbolic embedding of Internet graph for distance estimation and overlay construction . . . . . . . . . . . . . . 25--36 Nick Duffield and Matthias Grossglauser Trajectory sampling with unreliable reporting . . . . . . . . . . . . . . . 37--50 Fabian Kuhn and Roger Wattenhofer and Aaron Zollinger An algorithmic approach to geographic routing in ad hoc and sensor networks 51--62 Thrasyvoulos Spyropoulos and Konstantinos Psounis and Cauligi S. Raghavendra Efficient routing in intermittently connected mobile networks: the single-copy case . . . . . . . . . . . . 63--76 Thrasyvoulos Spyropoulos and Konstantinos Psounis and Cauligi S. Raghavendra Efficient routing in intermittently connected mobile networks: the multiple-copy case . . . . . . . . . . . 77--90 Aditya Akella and Bruce Maggs and Srinivasan Seshan and Anees Shaikh On the performance benefits of multihoming route control . . . . . . . 91--104 Shigang Chen and Meongchul Song and Sartaj Sahni Two techniques for fast computation of constrained shortest paths . . . . . . . 105--115 Venugopalan Ramasubramanian and Daniel Mossé BRA: a bidirectional routing abstraction for asymmetric mobile ad hoc networks 116--129 Xiliang Liu and Kaliappa Ravindran and Dmitri Loguinov A stochastic foundation of available bandwidth estimation: multi-hop analysis 130--143 Maulin Patel and R. Chandrasekaran and S. Venkatesan Improved quasi-path restoration in mesh networks . . . . . . . . . . . . . . . . 144--156 Srinivasan Ramasubramanian and Amit Chandak Dual-link failure resiliency through backup link mutual exclusion . . . . . . 157--169 Aleksandra Smiljanic Rate and delay guarantees provided by Clos packet switches with load balancing 170--181 Ilias Iliadis and Cyriel Minkenberg Performance of a speculative transmission scheme for scheduling-latency reduction . . . . . . 182--195 R. L. Cruz and Saleh Al-Harthi A service-curve framework for packet scheduling with switch configuration delays . . . . . . . . . . . . . . . . . 196--205 Saad Mneimneh Matching from the first iteration: an iterative switching algorithm for an input queued switch . . . . . . . . . . 206--217 Adam Kirsch and Michael Mitzenmacher Simple summaries for hashing with choices . . . . . . . . . . . . . . . . 218--231 Xin Wang and Henning Schulzrinne and Dilip Kandlur and Dinesh Verma Measurement and analysis of LDAP performance . . . . . . . . . . . . . . 232--243 William Lau and Gustav Filip Rosenbaum and Sanjay Jha Comments on `Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information' . . . . . . . . . . . . . . 244--245
Yuh-Ming Chiu and Do Young Eun Minimizing file download time in stochastic peer-to-peer networks . . . . 253--266 Daniel Stutzbach and Reza Rejaie and Subhabrata Sen Characterizing unstructured overlay topologies in modern P2P file-sharing systems . . . . . . . . . . . . . . . . 267--280 Kin-Wah Kwong and H. K. Tsang Building heterogeneous peer-to-peer networks: protocol and analysis . . . . 281--292 Lukas Kencl and Jean-Yves Le Boudec Adaptive load sharing for network processors . . . . . . . . . . . . . . . 293--306 Joel Sommers and Paul Barford and Nick Duffield and Amos Ron A geometric approach to improving active packet loss measurement . . . . . . . . 307--320 Y. Thomas Hou and Yi Shi and Hanif D. Sherali Rate allocation and network lifetime problems for wireless sensor networks 321--334 Nima Sarshar and Behnam A. Rezaei and Vwani P. Roychowdhury Low latency wireless ad hoc networking: power and bandwidth challenges and a solution . . . . . . . . . . . . . . . . 335--346 Honghai Zhang and Jennifer C. Hou Asymptotic critical total power for $k$-connectivity of wireless networks 347--358 Vehbi Cagri Gungor and Özgür B. Akan and Ian F. Akyildiz A real-time and reliable transport (RT)$^2$ protocol for wireless sensor and actor networks . . . . . . . . . . . 359--370 Isabella Cerutti and Andrea Fumagalli and Puja Gupta Delay models of single-source single-relay cooperative ARQ protocols in slotted radio networks with Poisson frame arrivals . . . . . . . . . . . . . 371--382 Holger Boche and Martin Schubert A superlinearly and globally convergent algorithm for power control and resource allocation with general interference functions . . . . . . . . . . . . . . . 383--395 Michael J. Neely and Eytan Modiano and Chih-Ping Li Fairness and optimal stochastic control for heterogeneous networks . . . . . . . 396--409 Seung Yeob Nam and Sunggon Kim and Dan Keun Sung Measurement-based admission control at edge routers . . . . . . . . . . . . . . 410--423 Zafar Ali and Waseem Sheikh and Edwin K. P. Chong and Arif Ghafoor A scalable call admission control algorithm . . . . . . . . . . . . . . . 424--434 Minsu Shin and Song Chong and Injong Rhee Dual-resource TCP/AQM for processing-constrained networks . . . . 435--449 Christina Fragouli and Jörg Widmer and Jean-Yves Le Boudec Efficient broadcasting using network coding . . . . . . . . . . . . . . . . . 450--463 Violet R. Syrotiuk and Charles J. Colbourn and Sruthi Yellamraju Rateless forward error correction for topology-transparent scheduling . . . . 464--472 Srinivasan Ramasubramanian and Arun K. Somani MICRON: a framework for connection establishment in optical networks . . . 473--485 Dongmei Wang and Guangzhi Li Efficient distributed bandwidth management for MPLS fast reroute . . . . 486--495 Aditya Akella and Bruce Maggs and Srinivasan Seshan and Anees Shaikh and Ramesh K. Sitaraman Corrections to `On the performance benefits of multihoming route control' 496--496
Sachin Katti and Hariharan Rahul and Wenjun Hu and Dina Katabi and Muriel Médard and Jon Crowcroft XORs in the air: practical wireless network coding . . . . . . . . . . . . . 497--510 Injong Rhee and Ajit Warrier and Mahesh Aia and Jeongki Min and Mihail L. Sichitiu Z-MAC: a hybrid MAC for wireless sensor networks . . . . . . . . . . . . . . . . 511--524 Archan Misra and Abhishek Roy and Sajal K. Das Information-theory based optimal location management schemes for integrated multi-system wireless networks . . . . . . . . . . . . . . . . 525--538 Behcet Sarikaya and Xiao Zheng SIP paging and tracking of wireless LAN hosts for VoIP . . . . . . . . . . . . . 539--548 Karthik Lakshminarayanan and Daniel Adkins and Adrian Perrig and Ion Stoica Securing user-controlled routing infrastructures . . . . . . . . . . . . 549--561 Seong Soo Kim and A. L. Narasimha Reddy Statistical techniques for detecting traffic anomalies through packet header data . . . . . . . . . . . . . . . . . . 562--575 Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons and Abraham D. Flaxman SybilGuard: defending against sybil attacks via social networks . . . . . . 576--589 Yung-Ming Li and Yong Tan and Yong-Pin Zhou Analysis of scale effects in peer-to-peer networks . . . . . . . . . 590--602 Laurent Massoulié and Milan Vojnovic Coupon replication systems . . . . . . . 603--616 Fabián E. Bustamante and Yi Qiao Designing less-structured P2P systems for the expected high churn . . . . . . 617--627 Xunqi Yu and James W. Modestino and Ragip Kurceren and Yee Sin Chan A model-based approach to evaluation of the efficacy of FEC coding in combating network packet losses . . . . . . . . . 628--641 Weiyi Zhang and Guoliang Xue and Jian Tang and Krishnaiyan Thulasiraman Faster algorithms for construction of recovery trees enhancing QoP and QoS . . 642--655 Guoliang Xue and Weiyi Zhang and Jian Tang and Krishnaiyan Thulasiraman Polynomial time approximation algorithms for multi-constrained QoS routing . . . 656--669 Jian Chu and Chin-Tau Lea New architecture and algorithms for fast construction of hose-model VPNs . . . . 670--679 Chen-Shu Wang and Ching-Ter Chang Integrated genetic algorithm and goal programming for network topology design problem with multiple objectives and multiple criteria . . . . . . . . . . . 680--690 Reuven Cohen and Gabi Nakibly On the computational complexity and effectiveness of $N$-hub shortest-path routing . . . . . . . . . . . . . . . . 691--704 Sundar Iyer and Ramana Rao Kompella and Nick McKeown Designing packet buffers for router linecards . . . . . . . . . . . . . . . 705--717 Si-Min He and Shu-Tao Sun and Hong-Tao Guan and Qiang Zheng and You-Jian Zhao and Wen Gao On guaranteed smooth switching for buffered crossbar switches . . . . . . . 718--731 Xiaohong Jiang and Achille Pattavina and Susumu Horiguchi Strictly nonblocking $f$-cast photonic networks . . . . . . . . . . . . . . . . 732--745
Athina Markopoulou and Gianluca Iannaccone and Supratik Bhattacharyya and Chen-Nee Chuah and Yashar Ganjali and Christophe Diot Characterization of failures in an operational IP backbone network . . . . 749--762 Min Sik Kim and Taekhyun Kim and Yong-June Shin and Simon S. Lam and Edward J. Powers A wavelet-based approach to detect shared congestion . . . . . . . . . . . 763--776 Tao Ye and Hema T. Kaur and Shivkumar Kalyanaraman and Murat Yuksel Large-scale network parameter configuration using an on-line simulation framework . . . . . . . . . . 777--790 Imad Aad and Jean-Pierre Hubaux and Edward W. Knightly Impact of denial of service attacks on ad hoc networks . . . . . . . . . . . . 791--802 Daniele Micciancio and Saurabh Panjwani Optimal communication complexity of generic multicast key distribution . . . 803--813 Supriya Krishnamurthy and Sameh El-Ansary and Erik Aurell and Seif Haridi An analytical study of a structured overlay in the presence of dynamic membership . . . . . . . . . . . . . . . 814--825 Loc Bui and Atilla Eryilmaz and R. Srikant and Xinzhou Wu Asynchronous congestion control in multi-hop wireless networks with maximal matching-based scheduling . . . . . . . 826--839 Rajiv Gandhi and Arunesh Mishra and Srinivasan Parthasarathy Minimizing broadcast latency and redundancy in ad hoc networks . . . . . 840--851 Vincent Lenders and Martin May and Bernhard Plattner Density-based anycast: a robust routing strategy for wireless ad hoc networks 852--863 Michele Garetto and Theodoros Salonidis and Edward W. Knightly Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks . . . . . . . . . . . 864--877 Omesh Tickoo and Biplab Sikdar Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks . . . 878--891 Cunqing Hua and Tak-Shing Peter Yum Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks . . . . . . . . . . . . . . . . 892--903 Xueyan Tang and Jianliang Xu Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks . . . . . . . . 904--917 Rami Langar and Nizar Bouabdallah and Raouf Boutaba A comprehensive analysis of mobility management in MPLS-based wireless access networks . . . . . . . . . . . . . . . . 918--931 Yiping Xing and R. Chandramouli Stochastic learning solution for distributed discrete power control game in wireless data networks . . . . . . . 932--944 Do Young Eun and Xinbing Wang Achieving 100% throughput in TCP/AQM under aggressive packet marking with small buffer . . . . . . . . . . . . . . 945--956 Stephen L. Spitler and Daniel C. Lee Integration of explicit effective-bandwidth-based QoS routing with best-effort routing . . . . . . . . 957--969 Andrew Brzezinski and Eytan Modiano Achieving 100% throughput in reconfigurable optical networks . . . . 970--983 Karyn Benson and Benjamin Birnbaum and Esteban Molina-Estolano and Ran Libeskind-Hadas Competitive analysis of online traffic grooming in WDM rings . . . . . . . . . 984--997
Nan Jin and Scott Jordan On the feasibility of dynamic congestion-based pricing in differentiated services networks . . . . 1001--1014 Miriam Allalouf and Yuval Shavitt Centralized and distributed algorithms for routing and weighted max-min fair bandwidth allocation . . . . . . . . . . 1015--1024 Ishai Menache and Nahum Shimkin Capacity management and equilibrium for proportional QoS . . . . . . . . . . . . 1025--1037 Tuna Güven and Richard J. La and Mark A. Shayman and Bobby Bhattacharjee A unified framework for multipath routing for unicast and multicast traffic . . . . . . . . . . . . . . . . 1038--1051 Shu Tao and John Apostolopoulos and Roch Guérin Real-time monitoring of video quality in IP networks . . . . . . . . . . . . . . 1052--1065 Milan Vojnovic and Ayalvadi J. Ganesh On the race of worms, alerts, and patches . . . . . . . . . . . . . . . . 1066--1079 Venkatesh Ramaiyan and Anurag Kumar and Eitan Altman Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability . . . . . . . . . . . . . 1080--1093 Hazer Inaltekin and Stephen B. Wicker The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes . . . . . . . . . . . . . . . . . 1094--1107 Wei Wang and Vikram Srinivasan and Kee-Chaing Chua Extending the lifetime of wireless sensor networks through mobile relays 1108--1120 Gaurav Sharma and Ravi R. Mazumdar A case for hybrid sensor networks . . . 1121--1132 Sundar Subramanian and Sanjay Shakkottai and Ari Arapostathis Broadcasting in sensor networks: the role of local information . . . . . . . 1133--1146 Ahmed Bader and Eylem Ekici Performance optimization of interference-limited multihop networks 1147--1160 Aditya Karnik and Aravind Iyer and Catherine Rosenberg Throughput-optimal configuration of fixed wireless networks . . . . . . . . 1161--1174 Honghai Zhang and Jennifer C. Hou On the asymptotic minimum transporting energy and its implication on the wireless network capacity . . . . . . . 1175--1187 Michael J. Neely Order optimal delay for opportunistic scheduling in multi-user wireless uplinks and downlinks . . . . . . . . . 1188--1199 Salah-Eddine Elayoubi and Beno\^\it Fourestié Performance evaluation of admission control and adaptive modulation in OFDMA WiMax systems . . . . . . . . . . . . . 1200--1211 Juan José Jaramillo and Fabio Milan and R. Srikant Padded frames: a novel algorithm for stable scheduling in load-balanced switches . . . . . . . . . . . . . . . . 1212--1225 Bensong Chen and George N. Rouskas and Rudra Dutta On hierarchical traffic grooming in WDM networks . . . . . . . . . . . . . . . . 1226--1238
Kuai Xu and Zhi-Li Zhang and Supratik Bhattacharyya Internet traffic behavior profiling for network security monitoring . . . . . . 1241--1252 Minho Sung and Jun Xu and Jun Li and Li Li Large-scale IP traceback in high-speed Internet: practical techniques and information-theoretic foundation . . . . 1253--1266 Xiaowei Yang and David Wetherall and Thomas Anderson TVA: a DoS-limiting network architecture 1267--1280 Yong Xia and Lakshminarayanan Subramanian and Ion Stoica and Shivkumar Kalyanaraman One more bit is enough . . . . . . . . . 1281--1294 Renata Teixeira and Aman Shaikh and Timothy G. Griffin and Jennifer Rexford Impact of hot-potato routing changes in IP networks . . . . . . . . . . . . . . 1295--1307 Fernando Solano and Thomas Stidsen and Ramon Fabregat and Jose Luis Marzo Label space reduction in MPLS networks: how much can a single stacked label do? 1308--1320 Randeep S. Bhatia and Murali Kodialam and T. V. Lakshman and Sudipta Sengupta Bandwidth guaranteed routing with fast restoration against link and node failures . . . . . . . . . . . . . . . . 1321--1330 Stamatis Stefanakos Reliable routings in networks with generalized link failure events . . . . 1331--1339 George F. Georgakopoulos Buffered cross-bar switches, revisited: design steps, proofs and simulations towards optimal rate and minimum buffer memory . . . . . . . . . . . . . . . . . 1340--1351 Srinivasan Ramasubramanian Supporting multiple protection strategies in optical networks . . . . . 1352--1365 Lei Song and Jing Zhang and Biswanath Mukherjee A comprehensive study on backup-bandwidth reprovisioning after network-state updates in survivable telecom mesh networks . . . . . . . . . 1366--1377 Qun Zhao and Mohan Gurusamy Lifetime maximization for connected target coverage in wireless sensor networks . . . . . . . . . . . . . . . . 1378--1391 John Papandriopoulos and Subhrakanti Dey and Jamie Evans Optimal and distributed protocols for cross-layer design of physical and transport layers in MANETs . . . . . . . 1392--1405 Andrew Brzezinski and Gil Zussman and Eytan Modiano Distributed throughput maximization in wireless mesh networks via pre-partitioning . . . . . . . . . . . . 1406--1419 Prashanth Hande and Sundeep Rangan and Mung Chiang and Xinzhou Wu Distributed uplink power control for optimal SIR assignment in cellular data networks . . . . . . . . . . . . . . . . 1420--1433 Aaron Walters and David Zage and Cristina Nita Rotaru A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks . . . . . . . . . . . . 1434--1446 Mohamed Hefeeda and Osama Saleh Traffic modeling and proportional partial caching for peer-to-peer systems 1447--1460 Tao Wu and David Starobinski A comparative analysis of server selection in content replication networks . . . . . . . . . . . . . . . . 1461--1474 Derek Leonard and Zhongmei Yao and Xiaoming Wang and Dmitri Loguinov On static and dynamic partitioning behavior of large-scale P2P networks . . 1475--1488
Piet Van Mieghem and Jasmina Omic and Robert Kooij Virus spread in networks . . . . . . . . 1--14 Yi Xie and Shun-Zheng Yu Monitoring the application-layer DDoS attacks for popular websites . . . . . . 15--25 Supranamaya Ranjan and Ram Swaminathan and Mustafa Uysal and Antonio Nucci and Edward Knightly DDoS-shield: DDoS-resilient scheduling to counter application layer attacks . . 26--39 Patrick Traynor and William Enck and Patrick McDaniel and Thomas La Porta Mitigating attacks on open functionality in SMS-capable cellular networks . . . . 40--53 Yi Xie and Shun-Zheng Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors . . . . . . . . . . . . . . . 54--65 Franck Le and Sihyung Lee and Tina Wong and Hyong S. Kim and Darrell Newcomb Detecting network-wide and router-specific misconfigurations through data mining . . . . . . . . . . 66--79 Khaled Harfoush and Azer Bestavros and John Byers Measuring capacity bandwidth of targeted path segments . . . . . . . . . . . . . 80--92 Piet Van Mieghem and Huijuan Wang The observable part of a network . . . . 93--105 Han Hee Song and Lili Qiu and Yin Zhang NetQuest: a flexible framework for large-scale network measurement . . . . 106--119 György Terdik and Tibor Gyires Lévy flights and fractal modeling of Internet traffic . . . . . . . . . . . . 120--129 Reaz Ahmed and Raouf Boutaba Plexus: a scalable peer-to-peer protocol enabling efficient subset search . . . . 130--143 Zhongmei Yao and Xiaoming Wang and Derek Leonard and Dmitri Loguinov Node isolation model and age-based neighbor selection in unstructured P2P networks . . . . . . . . . . . . . . . . 144--157 Xiaoming Fu and Henning Schulzrinne and Hannes Tschofenig and Christian Dickmann and Dieter Hogrefe Overhead and performance study of the General Internet Signaling Transport (GIST) protocol . . . . . . . . . . . . 158--171 Pascal von Rickenbach and Roger Wattenhofer and Aaron Zollinger Algorithmic models of interference in wireless ad hoc and sensor networks . . 172--185 Khaled Elmeleegy and Alan L. Cox and T. S. Eugene Ng Understanding and mitigating the effects of count to infinity in Ethernet networks . . . . . . . . . . . . . . . . 186--199 Jie Lian and Yunhao Liu and Kshirasagar Naik and Lei Chen Virtual surrounding face geocasting in wireless ad hoc and sensor networks . . 200--211 Sastry Kompella and Shiwen Mao and Y. Thomas Hou and Hanif D. Sherali On path selection and rate allocation for video in wireless mesh networks . . 212--224 Teerawat Issariyakul and Vikram Krishnamurthy Amplify-and-forward cooperative diversity wireless networks: model, analysis, and monotonicity properties 225--238 Hongbin Luo and Lemin Li and Hongfang Yu Routing connections with differentiated reliability requirements in WDM mesh networks . . . . . . . . . . . . . . . . 253--266 Stefano Avallone and Ian F. Akyildiz and Giorgio Ventre A channel and rate assignment algorithm and a layer-2.5 forwarding paradigm for multi-radio wireless mesh networks . . . 267--280 Vahid Tabatabaee and Leandros Tassiulas MNCM: a critical node matching approach to scheduling for input buffered switches with no speedup . . . . . . . . 294--304 Andrew Zalesky To burst or circuit switch? . . . . . . 305--318 Guanglei Liu and Chuanyi Ji Scalability of network-failure resilience: analysis using multi-layer probabilistic graphical models . . . . . 319--331 Giridhar Jayavelu and Srinivasan Ramasubramanian and Ossama Younis Maintaining colored trees for disjoint multipath routing under node failures 346--359
Bin Fan and John C. S. Lui and Dah-Ming Chiu The design trade-offs of BitTorrent-like file sharing protocols . . . . . . . . . 365--376 Daniel Stutzbach and Reza Rejaie and Nick Duffield and Subhabrata Sen and Walter Willinger On unbiased sampling for unstructured peer-to-peer networks . . . . . . . . . 377--390 Yihua He and Georgos Siganos and Michalis Faloutsos and Srikanth Krishnamurthy Lord of the links: a framework for discovering missing links in the Internet topology . . . . . . . . . . . 391--404 Andrea Bianco and Gianluca Mardente and Marco Mellia and Maurizio Munaf\`o and Luca Muscariello Web user-session inference by means of clustering techniques . . . . . . . . . 405--416 Darryl Veitch and Julien Ridoux and Satish Babu Korada Robust synchronization of absolute and difference clocks over networks . . . . 417--430 Björn Scheuermann and Wolfgang Kiess and Magnus Roos and Florian Jarre and Martin Mauve On the time synchronization of distributed log files in networks with local broadcast media . . . . . . . . . 431--444 Ricardo Oliveira and Beichuan Zhang and Dan Pei and Lixia Zhang Quantifying path exploration in the Internet . . . . . . . . . . . . . . . . 445--458 Murali Kodialam and T. V. Lakshman and James B. Orlin and Sudipta Sengupta Oblivious routing of highly variable traffic in service overlays and IP backbones . . . . . . . . . . . . . . . 459--472 Amund Kvalbein and Audun Fosselie Hansen and Tarik \vCi\vcic and Stein Gjessing and Olav Lysne Multiple routing configurations for fast IP network recovery . . . . . . . . . . 473--486 Reuven Cohen and Gabi Nakibly A traffic engineering approach for placement and selection of network services . . . . . . . . . . . . . . . . 487--500 Geoffrey Goodell and Mema Roussopoulos and Scott Bradner A directory service for perspective access networks . . . . . . . . . . . . 501--514 Pradeep Kyasanur and Nitin H. Vaidya Capacity of multichannel wireless networks under the protocol model . . . 515--527 Bhaskaran Raman and Kameswari Chebrolu and Dattatraya Gokhale and Sayandeep Sen On the feasibility of the link abstraction in wireless mesh networks 528--541 Bow-Nan Cheng and Murat Yuksel and Shivkumar Kalyanaraman Orthogonal rendezvous routing protocol for wireless mesh networks . . . . . . . 542--555 Mehdi Rasti and Ahmad R. Sharafat and Babak Seyfe Pareto-efficient and goal-driven power control in wireless networks: a game-theoretic approach with a novel pricing scheme . . . . . . . . . . . . . 556--569 Reuven Cohen and Boris Kapchits An optimal wake-up scheduling algorithm for minimizing energy consumption while limiting maximum delay in a mesh sensor network . . . . . . . . . . . . . . . . 570--581 Hanan Shpungin and Michael Segal Low-energy fault-tolerant bounded-hop broadcast in wireless networks . . . . . 582--590 Tianji Li and Qiang Ni and David Malone and Douglas Leith and Yang Xiao and Thierry Turletti Aggregation with fragment retransmission for very high-speed WLANs . . . . . . . 591--604 Alvaro A. Cárdenas and Svetlana Radosavac and John S. Baras Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments . . . . . . . . . . . . . . 605--617 Mingyu Chen and Xingzhe Fan and Manohar N. Murthi and T. Dilusha Wickramarathna and Kamal Premaratne Normalized queueing delay: congestion control jointly utilizing delay and marking . . . . . . . . . . . . . . . . 618--631 Bin Wu and Kwan L. Yeung and Mounir Hamdi and Xin Li Minimizing internal speedup for performance guaranteed switches with optical fabrics . . . . . . . . . . . . 632--645 Matthew Andrews and Lisa Zhang Complexity of wavelength assignment in optical network optimization . . . . . . 646--657 Kalyan Kuppuswamy and Daniel C. Lee An analytic approach to efficiently computing call blocking probabilities for multiclass WDM networks . . . . . . 658--670 Abdelhamid E. Eshoul and Hussein T. Mouftah Survivability approaches using $p$-cycles in WDM mesh networks under static traffic . . . . . . . . . . . . . 671--683
Ioannis Ch. Paschalidis and Georgios Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures . . . . . . . . . . . 685--697 Yan Hu and Dah-Ming Chiu and John C. S. Lui Entropy based adaptive flow aggregation 698--711 Kashi Venkatesh Vishwanath and Amin Vahdat Swing: realistic and responsive network traffic generation . . . . . . . . . . . 712--725 Xiaoming Wang and Zhongmei Yao and Dmitri Loguinov Residual-based estimation of peer and link lifetimes in P2P networks . . . . . 726--739 Feng Wang and Jian Qiu and Lixin Gao and Jia Wang On understanding transient interdomain routing failures . . . . . . . . . . . . 740--751 Murali Kodialam and T. V. Lakshman and Sudipta Sengupta Locally restorable routing of highly variable traffic . . . . . . . . . . . . 752--763 Barath Raghavan and Patric Verkaik and Alex C. Snoeren Secure and policy-compliant source routing . . . . . . . . . . . . . . . . 764--777 Jian Chu and Chin-Tau Lea Optimal link weights for IP-based networks supporting hose-model VPNs . . 778--788 Nicolas Hohn and Konstantina Papagiannaki and Darryl Veitch Capturing router congestion and delay 789--802 Wencheng Lu and Sartaj Sahni Succinct representation of static packet classifiers . . . . . . . . . . . . . . 803--816 Jun Li and Yiqiang Q. Zhao Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications . . . . . . . . . . . . . 817--830 Vincent Borrel and Franck Legendre and Marcelo Dias De Amorim and Serge Fdida SIMPS: using sociology for personal mobility . . . . . . . . . . . . . . . . 831--842 Saurabh Ganeriwal and Ilias Tsigkogiannis and Hohyun Shim and Vlassios Tsiatsis and Mani B. Srivastava and Deepak Ganesan Estimating clock uncertainty for efficient duty-cycling in sensor networks . . . . . . . . . . . . . . . . 843--856 Sungoh Kwon and Ness B. Shroff Analysis of shortest path routing for large multi-hop wireless networks . . . 857--869 Petar Djukic and Shahrokh Valaee Delay aware link scheduling for multi-hop TDMA wireless networks . . . . 870--883 Claudio Cicconetti and Ian F. Akyildiz and Luciano Lenzini FEBA: a bandwidth allocation algorithm for service differentiation in IEEE 802.16 mesh networks . . . . . . . . . . 884--897 Murtaza A. Zafer and Eytan Modiano A calculus approach to energy-efficient data transmission with quality-of-service constraints . . . . . 898--911 Chee Wei Tan and Daniel P. Palomar and Mung Chiang Energy-robustness tradeoff in cellular network power control . . . . . . . . . 912--925 Kae Won Choi and Wha Sook Jeon and Dong Geun Jeong Resource allocation in OFDMA wireless communications systems supporting multimedia services . . . . . . . . . . 926--935 Richard T. B. Ma and Vishal Misra and Dan Rubenstein An analysis of generalized slotted-Aloha protocols . . . . . . . . . . . . . . . 936--949 Xiang-Yang Li Multicast capacity of wireless ad hoc networks . . . . . . . . . . . . . . . . 950--961 Yuan-Cheng Lai and Chih-Chung Lin Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identification 962--975 Kevin Ross and Nicholas Bambos Projective cone scheduling (PCS) algorithms for packet switches of maximal throughput . . . . . . . . . . . 976--989 Hung Q. Ngo and Yang Wang and Dazhen Pan Rearrangeable and nonblocking $ [w, f]$-distributors . . . . . . . . . . . . 990--1001 Rodney Van Meter and Thaddeus D. Ladd and W. J. Munro and Kae Nemoto System design for a long-line quantum repeater . . . . . . . . . . . . . . . . 1002--1013
Jonathan S. Turner Strong performance guarantees for asynchronous buffered crossbar scheduler 1017--1028 Banit Agrawal and Timothy Sherwood High-bandwidth network memory system through virtual pipelines . . . . . . . 1029--1041 Michael Menth and Andreas Binzenhöfer and Stefan Mühleck Source models for speech traffic revisited . . . . . . . . . . . . . . . 1042--1051 Nazanin Magharei and Reza Rejaie PRIME: peer-to-peer receiver-driven mesh-based streaming . . . . . . . . . . 1052--1065 Vijay Sivaraman and Hossam Elgindy and David Moreland and Diethelm Ostry Packet pacing in small buffer optical packet switched networks . . . . . . . . 1066--1079 Satyajeet S. Ahuja and Srinivasan Ramasubramanian and Marwan M. Krunz Single-link failure detection in all-optical networks using monitoring cycles and paths . . . . . . . . . . . . 1080--1093 Suman Sarkar and Hong-Hsu Yen and Sudhir Dixit and Biswanath Mukherjee Hybrid wireless-optical broadband access network (WOBAN): network planning using Lagrangean relaxation . . . . . . . . . 1094--1105 Pan Li and Chi Zhang and Yuguang Fang Asymptotic connectivity in wireless ad hoc networks using directional antennas 1106--1117 Apoorva Jindal and Konstantinos Psounis The achievable rate region of 802.11-scheduled multihop networks . . . 1118--1131 Changhee Joo and Xiaojun Lin and Ness B. Shroff Understanding the capacity region of the Greedy maximal scheduling algorithm in multihop wireless networks . . . . . . . 1132--1145 Michael J. Neely Delay analysis for maximal scheduling with flow control in wireless networks with bursty traffic . . . . . . . . . . 1146--1159 Paramvir Bahl and Ranveer Chandra and Patrick P. C. Lee and Vishal Misra and Jitendra Padhye and Dan Rubenstein and Yan Yu Opportunistic use of client repeaters to improve performance of WLANs . . . . . . 1160--1171 Kyu-Han Kim and Kang G. Shin On accurate and asymmetry-aware measurement of link quality in wireless mesh networks . . . . . . . . . . . . . 1172--1185 Mehmet C. Vuran and Ian F. Akyildiz Error control in wireless sensor networks: a cross layer analysis . . . . 1186--1199 Shamik Sengupta and Mainak Chatterjee An economic framework for dynamic spectrum access and service pricing . . 1200--1213 Gwillerm Froc and Issam Mabrouki and Xavier Lagrange Design and performance of wireless data gathering networks based on unicast random walk routing . . . . . . . . . . 1214--1227 Ming-Jer Tsai and Hong-Yen Yang and Bing-Hong Liu and Wen-Qian Huang Virtual-coordinate-based delivery-guaranteed routing protocol in wireless sensor networks . . . . . . . . 1228--1241 Joon Ahn and Bhaskar Krishnamachari Scaling laws for data-centric storage and querying in wireless sensor networks 1242--1255 Ming Li and Deepak Ganesan and Prashant Shenoy PRESTO: feedback-driven data management in sensor networks . . . . . . . . . . . 1256--1269 Martín Casado and Michael J. Freedman and Justin Pettit and Jianying Luo and Natasha Gude and Nick McKeown and Scott Shenker Rethinking enterprise network control 1270--1283 Katerina Argyraki and David R. Cheriton Scalable network-layer defense against Internet bandwidth-flooding attacks . . 1284--1297 Sabyasachi Roy and Himabindu Pucha and Zheng Zhang and Y. Charlie Hu and Lili Qiu On the placement of infrastructure overlay nodes . . . . . . . . . . . . . 1298--1311 Jayakrishnan Nair and D. Manjunath Distributed iterative optimal resource allocation with concurrent updates of routing and flow control variables . . . 1312--1325 Hiroyuki Okamura and Tadashi Dohi and Kishor S. Trivedi Markovian arrival process parameter estimation with group data . . . . . . . 1326--1339 Françis Baccelli and Sridhar Machiraju and Darryl Veitch and Jean Bolot The role of PASTA in network measurement 1340--1353
Meeyoung Cha and Haewoon Kwak and Pablo Rodriguez and Yong-Yeol Ahn and Sue Moon Analyzing the video popularity characteristics of large-scale user generated content systems . . . . . . . 1357--1370 Moritz Steiner and Taoufik En-Najjary and Ernst W. Biersack Long term study of peer behavior in the KAD DHT . . . . . . . . . . . . . . . . 1371--1384 Yigal Bejerano Taking the skeletons out of the closets: a simple and efficient topology discovery scheme for large Ethernet LANs 1385--1398 Mudhakar Srivatsa and Arun Iyengar and Jian Yin and Ling Liu Scalable key management algorithms for location-based services . . . . . . . . 1399--1412 Fernando Paganini and Enrique Mallada A unified approach to congestion control and node-based multipath routing . . . . 1413--1426 Murali Kodialam and T. V. Lakshman and Sudipta Sengupta Guaranteed performance routing of unpredictable traffic with fast path restoration . . . . . . . . . . . . . . 1427--1438 Xin Yuan and Wickus Nienaber and Zhenhai Duan and Rami Melhem Oblivious routing in fat-tree based system area networks with uncertain traffic demands . . . . . . . . . . . . 1439--1452 Holger Boche and Martin Schubert Nash bargaining and proportional fairness for wireless systems . . . . . 1453--1466 Loc X. Bui and Sujay Sanghavi and R. Srikant Distributed link scheduling with constant overhead . . . . . . . . . . . 1467--1480 Changhee Joo and Ness B. Shroff Performance of random access scheduling schemes in multi-hop wireless networks 1481--1493 Zhenzhen Ye and Alhussein A. Abouzeid and Jing Ai Optimal stochastic policies for distributed data aggregation in wireless sensor networks . . . . . . . . . . . . 1494--1507 Yan Wu and Sonia Fahmy and Ness B. Shroff Optimal sleep/wake scheduling for time-synchronized sensor networks with QoS guarantees . . . . . . . . . . . . . 1508--1521 Michele Garetto and Paolo Giaccone and Emilio Leonardi Capacity scaling in ad hoc networks with heterogeneous mobile nodes: the super-critical regime . . . . . . . . . 1522--1535 Suli Zhao and Dipankar Raychaudhuri Scalability and performance evaluation of hierarchical hybrid wireless networks 1536--1549 Hui Ma and Rajiv Vijayakumar and Sumit Roy and Jing Zhu Optimizing 802.11 wireless mesh networks based on physical carrier sensing . . . 1550--1563 Wei-Jen Hsu and Thrasyvoulos Spyropoulos and Konstantinos Psounis and Ahmed Helmy Modeling spatial and temporal dependencies of user mobility in wireless mobile networks . . . . . . . . 1564--1577 Han Cai and Do Young Eun Crossing over the bounded domain: from exponential to power-law intermeeting time in mobile ad hoc networks . . . . . 1578--1591 Wei Wang and Mehul Motani and Vikram Srinivasan Opportunistic energy-efficient contact probing in delay-tolerant applications 1592--1605 Soung Chang Liew and Ying Jun Zhang and Da Rui Chen Bounded-mean-delay throughput and nonstarvation conditions in Aloha network . . . . . . . . . . . . . . . . 1606--1618 Stefan Alexandru Pascu and Ahmed A. El-Amawy On conflict-free all-to-all broadcast in one-hop optical networks of arbitrary topologies . . . . . . . . . . . . . . . 1619--1630 Michel Mandjes and Remco Van De Meent Resource dimensioning through buffer sampling . . . . . . . . . . . . . . . . 1631--1644 Ravi S. Prasad and Constantine Dovrolis and Marina Thottan Router buffer sizing for TCP traffic and the role of the output/input capacity ratio . . . . . . . . . . . . . . . . . 1645--1658 Chao-Lin Yu and Cheng-Shang Chang and Duan-Shin Lee CR switch: a load-balanced switch with contention and reservation . . . . . . . 1659--1671 Georgios Y. Lazarou and Julie Baca and Victor S. Frost and Joseph B. Evans Describing network traffic using the index of variability . . . . . . . . . . 1672--1683 Reuven Cohen and Niloofar Fazlollahi and David Starobinski Path switching and grading algorithms for advance channel reservation architectures . . . . . . . . . . . . . 1684--1695
Lachlan L. H. Andrew and Steven H. Low and Bartek P. Wydrowski Understanding XCP: equilibrium and fairness . . . . . . . . . . . . . . . . 1697--1710 Jerry Chi-Yuan Chou and Bill Lin and Subhabrata Sen and Oliver Spatscheck Proactive surge protection: a defense mechanism for bandwidth-based attacks 1711--1723 Yao Zhao and Yan Chen and David Bindel Towards unbiased end-to-end network diagnosis . . . . . . . . . . . . . . . 1724--1737 Mehmet H. Gunes and Kamil Sarac Resolving IP aliases in building traceroute-based Internet maps . . . . . 1738--1751 Ao-Jan Su and David R. Choffnes and Aleksandar Kuzmanovic and Fabián E. Bustamante Drafting behind Akamai: inferring network conditions based on CDN redirections . . . . . . . . . . . . . . 1752--1765 Michael Sirivianos and Xiaowei Yang and Stanislaw Jarecki Robust and efficient incentives for cooperative content distribution . . . . 1766--1779 George N. Rouskas and Nikhil Baradwaj On bandwidth tiered service . . . . . . 1780--1793 Huseyin Mutlu and Murat Alanyali and David Starobinski Spot pricing of secondary spectrum access in wireless cellular networks . . 1794--1804 Nicholas B. Chang and Mingyan Liu Optimal channel probing and transmission scheduling for opportunistic spectrum access . . . . . . . . . . . . . . . . . 1805--1818 Shrutivandana Sharma and Demosthenis Teneketzis An externalities-based decentralized optimal power allocation algorithm for wireless networks . . . . . . . . . . . 1819--1831 Omer Gurewitz and Vincenzo Mancuso and Jingpu Shi and Edward W. Knightly Measurement and modeling of the origins of starvation of congestion-controlled flows in wireless mesh networks . . . . 1832--1845 Abhinav Gupta and Xiaojun Lin and R. Srikant Low-complexity distributed scheduling algorithms for wireless networks . . . . 1846--1859 Mahdi Lotfinezhad and Ben Liang and Elvino S. Sousa On stability region and delay performance of linear-memory randomized scheduling for time-varying networks . . 1860--1873 Xiaojun Lin and Shahzada B. Rasool Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks . . . . . . . . 1874--1887 Michele Garetto and Paolo Giaccone and Emilio Leonardi Capacity scaling in ad hoc networks with heterogeneous mobile nodes: the subcritical regime . . . . . . . . . . . 1888--1901 Rik Sarkar and Xianjin Zhu and Jie Gao Double rulings for information brokerage in sensor networks . . . . . . . . . . . 1902--1915 Christopher J. Martinez and Devang K. Pandya and Wei-Ming Lin On designing fast nonuniformly distributed IP address lookup hashing algorithms . . . . . . . . . . . . . . . 1916--1925 Lynn Choi and Hyogon Kim and Sunil Kim and Moon Hae Kim Scalable packet classification through rulebase partitioning using the maximum entropy hashing . . . . . . . . . . . . 1926--1935 Mario Baldi and Guido Marchetto Pipeline forwarding of packets based on a low-accuracy network-distributed common time reference . . . . . . . . . 1936--1949 Michael Menth and Michael Duelli and Ruediger Martin and Jens Milbrandt Resilience analysis of packet-switched communication networks . . . . . . . . . 1950--1963 Srini Seetharaman and Volker Hilt and Markus Hofmann and Mostafa Ammar Resolving cross-layer conflict between overlay routing and traffic engineering 1964--1977 Amir Gourgy and Ted H. Szymanski and Douglas G. Down On tracking the behavior of an output-queued switch using an input-queued switch . . . . . . . . . . 1978--1988 Smita Rai and Ching-Fong Su and Biswanath Mukherjee On provisioning in all-optical networks: an impairment-aware approach . . . . . . 1989--2001 Onur Turkcu and Suresh Subramaniam Performance of optical networks with limited reconfigurability . . . . . . . 2002--2013 Yi-Ting Chen and Jay Cheng and Duan-Shin Lee Constructions of linear compressors, nonovertaking delay lines, and flexible delay lines for optical packet switching 2014--2027
Guohan Lu and Yan Chen and Stefan Birrer and Fabián E. Bustamante and Xing Li POPI: a user-level tool for inferring router packet forwarding priority . . . 1--14 Reuven Cohen and Liran Katzir Computational analysis and efficient algorithms for micro and macro OFDMA downlink scheduling . . . . . . . . . . 15--26 Sanghwan Lee and Zhi-Li Zhang and Sambit Sahu and Debanjan Saha On suitability of Euclidean embedding for host-based network coordinate systems . . . . . . . . . . . . . . . . 27--40 Jren-Chit Chin and Yu Dong and Wing-Kai Hon and Chris Yu-Tak Ma and David K. Y. Yau Detection of intelligent mobile target in a mobile sensor network . . . . . . . 41--52 Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li Thwarting zero-day polymorphic worms with network-level length-based signature generation . . . . . . . . . . 53--66 Ahmed E. Kamal $ 1 + N $ network protection for mesh networks: network coding-based protection using $p$-cycles . . . . . . 67--80 Fong Pong and Nian-Feng Tzeng SUSE: superior storage-efficiency for routing tables through prefix transformation and aggregation . . . . . 81--94 Stefan Rührup and Hanna Kalosha and Amiya Nayak and Ivan Stojmenovi\'c Message-efficient beaconless georouting with guaranteed delivery in wireless sensor, ad hoc, and actuator networks 95--108 Ricardo Oliveira and Dan Pei and Walter Willinger and Beichuan Zhang and Lixia Zhang The (in)completeness of the observed Internet AS-level structure . . . . . . 109--122 Jian Ni and Haiyong Xie and Sekhar Tatikonda and Yang Richard Yang Efficient and dynamic routing topology inference from end-to-end measurements 123--135 Steven Chamberland Global access network evolution . . . . 136--149 Zhen Yu and Yong Guan A dynamic en-route filtering scheme for data reporting in wireless sensor networks . . . . . . . . . . . . . . . . 150--163 Damien Fay and Hamed Haddadi and Andrew Thomason and Andrew W. Moore and Richard Mortier and Almerima Jamakovic and Steve Uhlig and Miguel Rio Weighted spectral distribution for Internet topology analysis: theory and applications . . . . . . . . . . . . . . 164--176 Yuichi Ohsita and Takashi Miyamura and Shin'ichi Arakawa and Shingo Ata and Eiji Oki and Kohei Shiomoto and Masayuki Murata Gradually reconfiguring virtual network topologies based on estimated traffic matrices . . . . . . . . . . . . . . . . 177--189 Behnam A. Rezaei and Nima Sarshar and Vwani P. Roychowdhury Distributed resource sharing in low-latency wireless ad hoc networks . . 190--201 Tao Shu and Marwan Krunz Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach . . . . . . . . 202--215 Jonathan L. Bredin and Erik D. Demaine and Mohammad Taghi Hajiaghayi and Daniela Rus Deploying sensor networks with guaranteed fault tolerance . . . . . . . 216--228 Bo Zhang and Tze Sing Eugene Ng and Animesh Nandi and Rudolf H. Riedi and Peter Druschel and Guohui Wang Measurement-based analysis, modeling, and synthesis of the Internet delay space . . . . . . . . . . . . . . . . . 229--242 Lap Kong Law and Konstantinos Pelechrinis and Srikanth V. Krishnamurthy and Michalis Faloutsos Downlink capacity of hybrid cellular ad hoc networks . . . . . . . . . . . . . . 243--256 Xiaoming Wang and Dmitri Loguinov Understanding and modeling the Internet topology: economics and evolution perspective . . . . . . . . . . . . . . 257--270 Balagangadhar G. Bathula and Vinod M. Vokkarane QoS-based manycasting over optical burst-switched (OBS) networks . . . . . 271--283 Bin Wu and Kwan L. Yeung and Pin-Han Ho ILP formulations for $p$-cycle design without candidate cycle enumeration . . 284--295 Rajgopal Kannan and Shuangqing Wei and Vasu Chakravarthy and Muralidhar Rangaswamy Approximation algorithms for minimum energy transmission scheduling in rate and duty-cycle constrained wireless networks . . . . . . . . . . . . . . . . 296--306 Saikat Ray and Roch Guérin and Kin-Wah Kwong and Rute Sofia Always acyclic distributed path computation . . . . . . . . . . . . . . 307--319 Mo Li and Yunhao Liu Rendered path: range-free localization in anisotropic sensor networks with holes . . . . . . . . . . . . . . . . . 320--332
Gireesh Shrimali and Aditya Akella and Almir Mutapcic Cooperative interdomain traffic engineering using Nash bargaining and decomposition . . . . . . . . . . . . . 341--352 Dragos Andrei and Massimo Tornatore and Marwan Batayneh and Charles U. Martel and Biswanath Mukherjee Provisioning of deadline-driven requests with flexible transmission rates in WDM mesh networks . . . . . . . . . . . . . 353--366 Amit Mondal and Aleksandar Kuzmanovic Upgrading mice to elephants: effects and end-point solutions . . . . . . . . . . 367--378 Yufang Xi and Edmund M. Yeh Distributed algorithms for minimum cost multicast with network coding . . . . . 379--392 Gagan Raj Gupta and Ness B. Shroff Delay analysis for wireless networks with single hop traffic and general interference constraints . . . . . . . . 393--405 Longbo Huang and Michael J. Neely The optimality of two prices: maximizing revenue in a stochastic communication system . . . . . . . . . . . . . . . . . 406--419 Bo\vzidar Radunovi\'c and Christos Gkantsidis and Peter Key and Pablo Rodriguez Toward practical opportunistic routing with intra-session network coding for mesh networks . . . . . . . . . . . . . 420--433 Satyajayant Misra and Seung Don Hong and Guoliang Xue and Jian Tang Constrained relay node placement in wireless sensor networks: formulation and approximations . . . . . . . . . . . 434--447 Nadim Parvez and Anirban Mahanti and Carey Williamson An analytic throughput model for TCP NewReno . . . . . . . . . . . . . . . . 448--461 Ashraf Al Daoud and Murat Alanyali and David Starobinski Pricing strategies for spectrum lease in secondary markets . . . . . . . . . . . 462--475 Srinivas Shakkottai and Ramesh Johari Demand-aware content distribution on the Internet . . . . . . . . . . . . . . . . 476--489 Alex X. Liu and Chad R. Meiners and Eric Torng TCAM Razor: a systematic approach towards minimizing packet classifiers in TCAMs . . . . . . . . . . . . . . . . . 490--500 Longbi Lin and Xiaojun Lin and Ness B. Shroff Low-complexity and distributed energy minimization in multihop wireless networks . . . . . . . . . . . . . . . . 501--514 Joohwan Kim and Xiaojun Lin and Ness B. Shroff and Prasun Sinha Minimizing delay and maximizing lifetime for wireless sensor networks with anycast . . . . . . . . . . . . . . . . 515--528 Si Qing Zheng and Ashwin Gumaste and Hong Shen A parallel self-routing rearrangeable nonblocking multi-$ \log_2 N $ photonic switching network . . . . . . . . . . . 529--539 Ilenia Tinnirello and Giuseppe Bianchi Rethinking the IEEE 802.11e EDCA performance modeling methodology . . . . 540--553 Nilanjan Banerjee and Mark D. Corner and Brian Neil Levine Design and field experimentation of an energy-efficient architecture for DTN throwboxes . . . . . . . . . . . . . . . 554--567 Reuven Cohen and Gabi Nakibly Maximizing restorable throughput in MPLS networks . . . . . . . . . . . . . . . . 568--581 Sheng Zhong and Fan Wu A collusion-resistant routing scheme for noncooperative wireless ad hoc networks 582--595 Aruna Balasubramanian and Brian Neil Levine and Arun Venkataramani Replication routing in DTNs: a resource allocation approach . . . . . . . . . . 596--609 Mohamed Hefeeda and Cheng-Hsin Hsu On burst transmission scheduling in mobile TV broadcast networks . . . . . . 610--623 Chuan-Ching Sue and Hsaing-Wen Cheng A fitting report position scheme for the gated IPACT dynamic bandwidth algorithm in EPONs . . . . . . . . . . . . . . . . 624--637 Atilla Eryilmaz and Asuman Ozdaglar and Devavrat Shah and Eytan Modiano Distributed cross-layer algorithms for the optimal control of multihop wireless networks . . . . . . . . . . . . . . . . 638--651 Joel Sommers and Paul Barford and Nick Duffield and Amos Ron Multiobjective monitoring for SLA compliance . . . . . . . . . . . . . . . 652--665 Ionut Trestian and Supranamaya Ranjan and Aleksandar Kuzmanovic and Antonio Nucci Googling the Internet: profiling Internet endpoints via the World Wide Web . . . . . . . . . . . . . . . . . . 666--679
Cheng-Hsin Hsu and Mohamed M. Hefeeda Broadcasting video streams encoded with arbitrary bit rates in energy-constrained mobile TV networks 681--694 David Starobinski and Weiyao Xiao Asymptotically optimal data dissemination in multichannel wireless sensor networks: single radios suffice 695--707 Martin Karsten Approximation of generalized processor sharing with interleaved stratified timer wheels . . . . . . . . . . . . . . 708--721 Ioannis Broustis and Konstantina Papagiannaki and Srikanth V. Krishnamurthy and Michalis Faloutsos and Vivek P. Mhatre Measurement-driven guidelines for 802.11 WLAN design . . . . . . . . . . . . . . 722--735 Suat Ozdemir and Hasan Çam Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks 736--749 Nina Skorin-Kapov and Jiajia Chen and Lena Wosinska A new approach to optical networks security: attack-aware routing and wavelength assignment . . . . . . . . . 750--760 Yun Mao and Feng Wang and Lili Qiu and Simon Lam and Jonathan Smith S4: small state and small stretch compact routing protocol for large static wireless networks . . . . . . . . 761--774 Richard T. B. Ma and Dah Ming Chiu and John C. S. Lui and Vishal Misra and Dan Rubenstein Internet economics: the use of Shapley value for ISP settlement . . . . . . . . 775--787 V. J. Venkataramanan and Xiaojun Lin On wireless scheduling algorithms for minimizing the queue-overflow probability . . . . . . . . . . . . . . 788--801 Hongseok Kim and Gustavo De Veciana Leveraging dynamic spare capacity in wireless systems to conserve mobile terminals' energy . . . . . . . . . . . 802--815 Abdallah Khreishah and Chih-Chun Wang and Ness B. Shroff Rate control with pairwise intersession network coding . . . . . . . . . . . . . 816--829 Enrique Campos-Náñez Decentralized algorithms for adaptive pricing in multiclass loss networks . . 830--843 Ao Tang and Xiaoliang Wei and Steven H. Low and Mung Chiang Equilibrium of heterogeneous congestion control: optimality and stability . . . 844--857 Parbati Kumar Manna and Shigang Chen and Sanjay Ranka Inside the permutation-scanning worms: propagation modeling and analysis . . . 858--870 Jun Luo and Jean-Pierre Hubaux Joint sink mobility and routing to maximize the lifetime of wireless sensor networks: the case of constrained mobility . . . . . . . . . . . . . . . . 871--884 Haifeng Yu and Phillip B. Gibbons and Michael Kaminsky and Feng Xiao SybilLimit: a near-optimal social network defense against Sybil attacks 885--898 Chris Chambers and Wu-Chang Feng and Sambit Sahu and Debanjan Saha and David Brandt Characterizing online games . . . . . . 899--910 Cesare Roseti and Michele Luglio and Francesco Zampognaro Analysis and performance evaluation of a burst-based TCP for satellite DVB RCS links . . . . . . . . . . . . . . . . . 911--921 Qingya She and Xiaodong Huang and Jason P. Jue How reliable can two-path protection be? 922--933 Ziqiu Yun and Xiaole Bai and Dong Xuan and Ten H. Lai and Weijia Jia Optimal deployment patterns for full coverage and $k$-connectivity ($ k <= 6$) wireless sensor networks . . . . . . . . 934--947 Wencheng Lu and Sartaj Sahni Low-power TCAMs for very large forwarding tables . . . . . . . . . . . 948--959 Libin Jiang and Jean Walrand A distributed CSMA algorithm for throughput and utility maximization in wireless networks . . . . . . . . . . . 960--972 Ritesh Madan and Stephen P. Boyd and Sanjay Lall Fast algorithms for resource allocation in wireless cellular networks . . . . . 973--984 Ori Gerstel and G. Sasaki A general framework for service availability for bandwidth-efficient connection-oriented networks . . . . . . 985--995 Chun-I Fan and Pei-Hsiu Ho and Ruei-Hau Hsu Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications . . . . . . . . . 996--1009
Milan Vojnovi\'c and Varun Gupta and Thomas Karagiannis and Christos Gkantsidis Sampling strategies for epidemic-style information dissemination . . . . . . . 1013--1025 Mariyam Mirza and Joel Sommers and Paul Barford and Xiaojin Zhu A machine learning approach to TCP throughput prediction . . . . . . . . . 1026--1039 Jörg Liebeherr and Markus Fidler and Shahrokh Valaee A system-theoretic approach to bandwidth estimation . . . . . . . . . . . . . . . 1040--1053 Yufang Xi and Edmund M. Yeh Throughput optimal distributed power control of stochastic wireless networks 1054--1066 Song Guo and Victor C. M. Leung A distributed algorithm for min-max tree and max-min cut problems in communication networks . . . . . . . . . 1067--1076 Bing Hu and Kwan L. Yeung Feedback-based scheduling for load-balanced two-stage switches . . . . 1077--1090 Ming Yu and Mengchu Zhou A performance modeling scheme for multistage switch networks with phase-type and bursty traffic . . . . . 1091--1104 Sriram Lakshmanan and Cheng-Lin Tsao and Raghupathy Sivakumar Aegis: physical space security for wireless networks with smart antennas 1105--1118 Yanming Shen and Shivendra S. Panwar and H. Jonathan Chao SQUID: a practical 100% throughput scheduler for crosspoint buffered switches . . . . . . . . . . . . . . . . 1119--1131 Yunhao Liu and Kebin Liu and Mo Li Passive diagnosis for wireless sensor networks . . . . . . . . . . . . . . . . 1132--1144 Xiang-Yang Li and Yunhao Liu and Shi Li and ShaoJie Tang Multicast capacity of wireless ad hoc networks under Gaussian channel model 1145--1157 Sudipta Sengupta and Shravan Rayanchu and Suman Banerjee Network coding-aware routing in wireless networks . . . . . . . . . . . . . . . . 1158--1170 Murtaza Zafer and Bong Jun Ko and Ivan Wang-Hei Ho Transmit power estimation using spatially diverse measurements under wireless fading . . . . . . . . . . . . 1171--1180 Haythem A. Bany Salameh and Marwan Krunz and Ossama Younis Cooperative adaptive spectrum sharing in cognitive radio networks . . . . . . . . 1181--1194 Yong Liu Delay bounds of chunk-based peer-to-peer video streaming . . . . . . . . . . . . 1195--1206 Can Emre Koksal Rate quantization and the speedup required to achieve 100% throughput for multicast over crossbar switches . . . . 1207--1219 Hassan Gobjuka and Yuri J. Breitbart Ethernet topology discovery for networks with incomplete information . . . . . . 1220--1233 Zubair M. Fadlullah and Tarik Taleb and Athanasios V. Vasilakos and Mohsen Guizani and Nei Kato DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis . . . . . . . . 1234--1247 Di Wu and Yong Liu and Keith W. Ross Modeling and analysis of multichannel P2P live video systems . . . . . . . . . 1248--1260 Patrick Loiseau and Paulo Gonçalves and Guillaume Dewaele and Pierre Borgnat and Patrice Abry and Pascale Vicat-Blanc Primet Investigating self-similarity and heavy-tailed distributions on a large-scale experimental facility . . . 1261--1274 Mario Barbera and Alfio Lombardo and Carla Panarello and Giovanni Schembra Queue stability analysis and performance evaluation of a TCP-compliant window management mechanism . . . . . . . . . . 1275--1288 Kishore Ramachandran and Ravi Kokku and Honghai Zhang and Marco Gruteser Symphony: synchronous two-phase rate and power control in 802.11 WLANs . . . . . 1289--1302 Lijun Chen and Steven H. Low and John C. Doyle Random access game and medium access control design . . . . . . . . . . . . . 1303--1316 Changchuan Yin and Long Gao and Shuguang Cui Scaling laws for overlaid wireless networks: a cognitive radio network versus a primary network . . . . . . . . 1317--1329 Bill Lin and Isaac Keslassy The concurrent matching switch architecture . . . . . . . . . . . . . . 1330--1343
Xiaolong Li and Homayoun Yousefi'zadeh Analysis, simulation, and implementation of VCP: a wireless profiling . . . . . . 1345--1358 Mikhail Afanasyev and Tsuwei Chen and Geoffrey M. Voelker and Alex C. Snoeren Usage patterns in an urban WiFi network 1359--1372 Shervan Fashandi and Shahab Oveis Gharan and Amir K. Khandani Path diversity over packet switched networks: performance analysis and rate allocation . . . . . . . . . . . . . . . 1373--1386 Jun Luo and Catherine Rosenberg and André Girard Engineering wireless mesh networks: joint scheduling, routing, power control, and rate adaptation . . . . . . 1387--1400 Leonard H. Grokop and David N. C. Tse Spectrum sharing between wireless networks . . . . . . . . . . . . . . . . 1401--1412 Irene Y. Chen and Li-Da Tong and Yi-Ming Huang Rearrangeable nonblocking optical interconnection network fabrics with crosstalk constraints . . . . . . . . . 1413--1421 Ao Tang and Lachlan L. H. Andrew and Krister Jacobsson and Karl H. Johansson and Håkan Hjalmarsson and Steven H. Low Queue dynamics with window flow control 1422--1435 S. Q. Zheng and Jianping Wang and Bing Yang and Mei Yang Minimum-cost multiple paths subject to minimum link and node sharing in a network . . . . . . . . . . . . . . . . 1436--1449 Utku Günay Acer and Shivkumar Kalyanaraman and Alhussein A. Abouzeid Weak state routing for large-scale dynamic networks . . . . . . . . . . . . 1450--1463 P. S. Chandrashekhar Thejaswi and Junshan Zhang and Man-On Pun and H. Vincent Poor and Dong Zheng Distributed opportunistic scheduling with two-level probing . . . . . . . . . 1464--1477 Eli Brosh and Salman Abdul Baset and Vishal Misra and Dan Rubenstein and Henning Schulzrinne The delay-friendliness of TCP for real-time traffic . . . . . . . . . . . 1478--1491 Madanagopal Ramachandran and N. Usha Rani and Timothy A. Gonsalves Path computation algorithms for dynamic service provisioning with protection and inverse multiplexing in SDH/SONET networks . . . . . . . . . . . . . . . . 1492--1504 Alessandro Finamore and Marco Mellia and Michela Meo and Dario Rossi KISS: stochastic packet inspection classifier for UDP traffic . . . . . . . 1505--1515 Domenico Giustiniano and David Malone and Douglas J. Leith and Konstantina Papagiannaki Measuring transmission opportunities in 802.11 links . . . . . . . . . . . . . . 1516--1529 Eyuphan Bulut and Zijian Wang and Boleslaw Karol Szymanski Cost-effective multiperiod spraying for routing in delay-tolerant networks . . . 1530--1543 MohammadHossein Bateni and Alexandre Gerber and MohammadTaghi Hajiaghayi and Subhabrata Sen Multi-VPN optimization for scalable routing via relaying . . . . . . . . . . 1544--1556 Konstantinos Christodoulopoulos and Konstantinos Manousakis and Emmanouel Varvarigos Offline routing and wavelength assignment in transparent WDM networks 1557--1570 Yan Wu and Zhoujia Mao and Sonia Fahmy and Ness B. Shroff Constructing maximum-lifetime data gathering forests in sensor networks . . 1571--1584 Tianxiong Ji and Eleftheria Athanasopoulou and R. Srikant On optimal scheduling algorithms for small generalized switches . . . . . . . 1585--1598 Neda Beheshti and Emily Burmeister and Yashar Ganjali and John E. Bowers and Daniel J. Blumenthal and Nick McKeown Optical packet buffers for backbone Internet routers . . . . . . . . . . . . 1599--1609 Shan Chu and Xin Wang Opportunistic and cooperative spatial multiplexing in MIMO ad hoc networks . . 1610--1623 Giusi Alfano and Michele Garetto and Emilio Leonardi and Valentina Martina Capacity scaling of wireless networks with inhomogeneous node density: lower bounds . . . . . . . . . . . . . . . . . 1624--1636 Yung Yi and Gustavo De Veciana and Sanjay Shakkottai MAC scheduling with low overheads by learning neighborhood contention patterns . . . . . . . . . . . . . . . . 1637--1650 Agostino Forestiero and Emilio Leonardi and Carlo Mastroianni and Michela Meo Self-chord: a bio-inspired P2P framework for self-organizing distributed systems 1651--1664 Anat Bremler-Barr and David Hay and Danny Hendler and Ron M. Roth PEDS: a parallel error detection scheme for TCAM devices . . . . . . . . . . . . 1665--1675
Nizar Bouabdallah and Rami Langar and Raouf Boutaba Design and analysis of mobility-aware clustering algorithms for wireless mesh networks . . . . . . . . . . . . . . . . 1677--1690 Srinivas Shakkottai and Xin Liu and R. Srikant The multicast capacity of large multihop wireless networks . . . . . . . . . . . 1691--1700 Douglas M. Blough and G. Resta and P. Santi Approximation algorithms for wireless link scheduling with SINR-based interference . . . . . . . . . . . . . . 1701--1712 Sastry Kompella and Jeffrey E. Wieselthier and Anthony Ephremides and Hanif D. Sherali and Gam D. Nguyen On optimal SINR-based scheduling in multihop wireless networks . . . . . . . 1713--1724 Nikhil Shetty and Galina Schwartz and Jean Walrand Internet QoS and regulations . . . . . . 1725--1737 Young Myoung Ko and Natarajan Gautam Epidemic-based information dissemination in wireless mobile sensor networks . . . 1738--1751 Adam Kirsch and Michael Mitzenmacher The power of one move: hashing schemes for hardware . . . . . . . . . . . . . . 1752--1765 Ali Tajer and Xiaodong Wang Multiuser diversity gain in cognitive networks . . . . . . . . . . . . . . . . 1766--1779 Ashima Gupta and Debalina Ghosh and Prasant Mohapatra Scheduling prioritized services in multihop OFDMA networks . . . . . . . . 1780--1792 Soumya Sen and Youngmi Jin and Roch Guérin and Kartik Hosanagar Modeling the dynamics of network technology adoption and the role of converters . . . . . . . . . . . . . . . 1793--1805 Zheng Yang and Yunhao Liu and Xiang-Yang Li Beyond trilateration: on the localizability of wireless ad hoc networks . . . . . . . . . . . . . . . . 1806--1814 Zheng Zhang and Ying Zhang and Y. Charlie Hu and Z. Morley Mao and Randy Bush iSPY: detecting IP prefix hijacking on my own . . . . . . . . . . . . . . . . . 1815--1828 Yong Liao and Lixin Gao and Roch Guérin and Zhi-Li Zhang Safe interdomain routing under diverse commercial agreements . . . . . . . . . 1829--1840 Gaurav S. Kasbekar and Saswati Sarkar Spectrum auction framework for access allocation in cognitive radio networks 1841--1854 Diana Berbecaru and Luca Albertalli and Antonio Lioy The ForwardDiffsig scheme for multicast authentication . . . . . . . . . . . . . 1855--1868 Mohammad A. Saleh and Ahmed E. Kamal Design and provisioning of WDM networks with many-to-many traffic grooming . . . 1869--1882 Diego Lucerna and Massimo Tornatore and Achille Pattavina Algorithms and models for backup reprovisioning in WDM networks . . . . . 1883--1894 Hyang-Won Lee and Eytan Modiano and Kayi Lee Diverse routing in networks with probabilistic failures . . . . . . . . . 1895--1907 Reuven Cohen and Guy Grebla and Liran Katzir Cross-layer hybrid FEC/ARQ reliable multicast with adaptive modulation and coding in broadband wireless networks 1908--1920 Jaeok Park and Mihaela Van Der Schaar Medium access control protocols with memory . . . . . . . . . . . . . . . . . 1921--1934 Kaidi Huang and Ken R. Duffy and David Malone On the validity of IEEE 802.11 MAC modeling hypotheses . . . . . . . . . . 1935--1948 Joseph Camp and Edward Knightly Modulation rate adaptation in urban and vehicular environments: cross-layer implementation and experimental evaluation . . . . . . . . . . . . . . . 1949--1962 Hanan Shpungin and Michael Segal Near-optimal multicriteria spanner constructions in wireless ad hoc networks . . . . . . . . . . . . . . . . 1963--1976 Domenico Ficara and Andrea Di Pietro and Stefano Giordano and Gregorio Procissi and Fabio Vitucci Enhancing counting bloom filters through Huffman-coded multilayer structures . . 1977--1987 Shrinivasa Kini and Srinivasan Ramasubramanian and Amund Kvalbein and Audun Fosselie Hansen Fast recovery from dual-link or single-node failures in IP networks using tunneling . . . . . . . . . . . . 1988--1999
Eitan Altman and Francesco De Pellegrini Forward correction and fountain codes in delay-tolerant networks . . . . . . . . 1--13 Pierluigi Rolando and Riccardo Sisto and Fulvio Risso SPAF: stateless FSA-based packet filters 14--27 Zhong Zhou and Zheng Peng and Jun-Hong Cui and Zhijie Shi Efficient multipath communication for time-critical applications in underwater acoustic sensor networks . . . . . . . . 28--41 Yipeng Zhou and Dah-Ming Chiu and John C. S. Lui A simple model for chunk-scheduling strategies in P2P streaming . . . . . . 42--54 Hyunseok Chang and Sugih Jamin and Wenjie Wang Live streaming with receiver-based peer-division multiplexing . . . . . . . 55--68 Reuven Cohen and Boris Kapchits Continuous neighbor discovery in asynchronous sensor networks . . . . . . 69--79 Matteo Varvello and Stefano Ferrari and Ernst Biersack and Christophe Diot Exploring second life . . . . . . . . . 80--91 Adrian E. Conway Fast simulation of service availability in mesh networks with dynamic path restoration . . . . . . . . . . . . . . 92--101 Dan Li and Chuanxiong Guo and Haitao Wu and Kun Tan and Yongguang Zhang and Songwu Lu and Jianping Wu Scalable and cost-effective interconnection of data-center servers using dual server ports . . . . . . . . 102--114 Lihua Yuan and Chen-Nee Chuah and Prasant Mohapatra ProgME: towards programmable network measurement . . . . . . . . . . . . . . 115--128 Gagan Raj Gupta and Ness B. Shroff Delay analysis and optimality of scheduling policies for multihop wireless networks . . . . . . . . . . . 129--141 Andrea Bianco and David Hay and Fabio Neri Crosstalk-preventing scheduling in single-and two-stage AWG-based cell switches . . . . . . . . . . . . . . . . 142--155 Tianji Li and Douglas Leith and David Malone Buffer sizing for 802.11-based networks 156--169 Berk Canberk and Ian F. Akyildiz and Sema Oktug Primary user activity modeling using first-difference filter clustering and correlation in cognitive radio networks 170--183 Patrick Tague and Sidharth Nabar and James A. Ritcey and Radha Poovendran Jamming-aware traffic allocation for multiple-path routing using portfolio selection . . . . . . . . . . . . . . . 184--194 Ivan Wang-Hei Ho and Kin K. Leung and John W. Polak Stochastic model and connectivity dynamics for VANETs in signalized road systems . . . . . . . . . . . . . . . . 195--208 Yi Xu and Wenye Wang The limit of information propagation speed in large-scale multihop wireless networks . . . . . . . . . . . . . . . . 209--222 Ruogu Li and Atilla Eryilmaz and Lei Ying and Ness B. Shroff A unified approach to optimizing performance in networks serving heterogeneous flows . . . . . . . . . . 223--236 Chad R. Meiners and Alex X. Liu and Eric Torng Topological transformation approaches to TCAM-based packet classification . . . . 237--250 Ossama Mohamed Younis and Marwan M. Krunz and Srinivasan Ramasubramanian ROC: resilient online coverage for surveillance applications . . . . . . . 251--264 Yuanzhe Xuan and Chin-Tau Lea Network-coding multicast networks with QoS guarantees . . . . . . . . . . . . . 265--274 János Tapolcai and Bin Wu and Pin-Han Ho and Lajos Rónyai A novel approach for failure localization in all-optical mesh networks . . . . . . . . . . . . . . . . 275--285 Jerry T. Chiang and Yih-Chun Hu Cross-layer jamming detection and mitigation in wireless broadcast networks . . . . . . . . . . . . . . . . 286--298 Mohammad A. Saleh and Ahmed E. Kamal Erratum to \em Design and Provisioning of WDM Networks With Many-to-Many Traffic Grooming . . . . . . . . . . . . 299--299
Peng Wang and Stephan Bohacek Practical computation of optimal schedules in multihop wireless networks 305--318 Chi Zhang and Yang Song and Yuguang Fang and Yanchao Zhang On the price of security in large-scale wireless ad hoc networks . . . . . . . . 319--332 Henri Dubois-Ferri\`ere and Matthias Grossglauser and Martin Vetterli Valuable detours: least-cost anypath routing . . . . . . . . . . . . . . . . 333--346 Ashvin Lakshmikantha and Carolyn Beck and R. Srikant Impact of file arrivals and departures on buffer sizing in core routers . . . . 347--358 Ruhai Wang and Scott C. Burleigh and Paavan Parikh and Che-Jen Lin and Bo Sun Licklider transmission protocol (LTP)-based DTN for cislunar communications . . . . . . . . . . . . . 359--368 Cong Liu and Jie Wu Practical routing in a cyclic MobiSpace 369--382 Christos K. Liaskos and Sophia G. Petridou and Georgios I. Papadimitriou Towards realizable, low-cost broadcast systems for dynamic environments . . . . 383--392 Kyu-Han Kim and Kang G. Shin Self-reconfigurable wireless mesh networks . . . . . . . . . . . . . . . . 393--404 Bilal Sadiq and Seung Jun Baek and Gustavo De Veciana Delay-optimal opportunistic scheduling and approximations: the log rule . . . . 405--418 Stefano Secci and Jean-Louis Rougier and Achille Pattavina and Fioravante Patrone and Guido Maier Peering equilibrium multipath routing: a game theory framework for Internet peering settlements . . . . . . . . . . 419--432 Ping Xu and Xiang-Yang Li TOFU: semi-truthful online frequency allocation mechanism for wireless network . . . . . . . . . . . . . . . . 433--446 Matthew Andrews and Lisa Zhang Scheduling algorithms for multicarrier wireless data systems . . . . . . . . . 447--455 Wei Wei and Bing Wang and Don Towsley and Jim Kurose Model-based identification of dominant congested links . . . . . . . . . . . . 456--469 Gaurav S. Kasbekar and Yigal Bejerano and Saswati Sarkar Lifetime and coverage guarantees through distributed coordinate-free sensor activation . . . . . . . . . . . . . . . 470--483 Joohwan Kim and Xiaojun Lin and Ness B. Shroff Optimal anycast technique for delay-sensitive energy-constrained asynchronous sensor networks . . . . . . 484--497 Michele Flammini and Alberto Marchetti-Spaccamela and Gianpiero Monaco and Luca Moscardelli and Shmuel Zaks On the complexity of the regenerator placement problem in optical networks 498--511 Gautam Thatte and Urbashi Mitra and John Heidemann Parametric methods for anomaly detection in aggregate traffic . . . . . . . . . . 512--525 Jung-Shian Li and Ching-Fang Yang and Jian-Hong Chen Star-block design in two-level survivable optical networks . . . . . . 526--539 Xiaoping Wang and Jun Luo and Yunhao Liu and Shanshan Li and Dezun Dong Component-based localization in sparse wireless networks . . . . . . . . . . . 540--548 Libin Jiang and Venkat Anantharam and Jean Walrand How bad are selfish investments in network security? . . . . . . . . . . . 549--560 Mohamed Elhawary and Zygmunt J. Haas Energy-efficient protocol for cooperative networks . . . . . . . . . . 561--574 Jian Ni and R. Srikant and Xinzhou Wu Coloring spatial point processes with applications to peer discovery in large wireless networks . . . . . . . . . . . 575--588 Holger Boche and Siddharth Naik and Martin Schubert Pareto boundary of utility sets for multiuser wireless systems . . . . . . . 589--601 Jian Qiu and Mohan Gurusamy and Kee Chaing Chua and Yong Liu Local restoration with multiple spanning trees in metro Ethernet networks . . . . 602--614
Mahesh Balakrishnan and Tudor Marian and Kenneth P. Birman and Hakim Weatherspoon and Lakshmi Ganesh Maelstrom: transparent error correction for communication between data centers 617--629 Injong Rhee and Minsu Shin and Seongik Hong and Kyunghan Lee and Seong Joon Kim and Song Chong On the Levy-walk nature of human mobility . . . . . . . . . . . . . . . . 630--643 Salim El Rouayheb and Alex Sprintson and Costas Georghiades Robust network codes for unicast connections: a case study . . . . . . . 644--656 Sheng Huang and Charles U. Martel and Biswanath Mukherjee Survivable multipath provisioning with differential delay constraint in telecom mesh networks . . . . . . . . . . . . . 657--669 Nan Hua and Jun Xu and Bill Lin and Haiquan Zhao BRICK: a novel exact active statistics counter architecture . . . . . . . . . . 670--682 Domenico Ficara and Andrea Di Pietro and Stefano Giordano and Gregorio Procissi and Fabio Vitucci and Gianni Antichi Differential encoding of DFAs for fast regular expression matching . . . . . . 683--694 Yu-Wei Eric Sung and Xin Sun and Sanjay G. Rao and Geoffrey G. Xie and David A. Maltz Towards systematic design of enterprise networks . . . . . . . . . . . . . . . . 695--708 Mathieu Leconte and Jian Ni and R. Srikant Improved bounds on the throughput efficiency of greedy maximal scheduling in wireless networks . . . . . . . . . . 709--720 Balaji Rengarajan and Gustavo De Veciana Architecture and abstractions for environment and traffic-aware system-level coordination of wireless networks . . . . . . . . . . . . . . . . 721--734 Kostas M. Katrinis and Anna Tzanakaki On the dimensioning of WDM optical networks with impairment-aware regeneration . . . . . . . . . . . . . . 735--746 Xiaolan Joy Zhang and Sun-Il Kim and Steven S. Lumetta Opportunity cost analysis for dynamic wavelength routed mesh networks . . . . 747--759 Saumitra Das and Konstantina Papagiannaki and Suman Banerjee and Y. C. Tay SWARM: the power of structure in community wireless mesh networks . . . . 760--773 Murali Kodialam and T. V. Lakshman and Sudipta Sengupta Traffic-oblivious routing in the hose model . . . . . . . . . . . . . . . . . 774--787 Pere Barlet-Ros and Gianluca Iannaccone and Josep Sanju\`as-Cuxart and Josep Solé-Pareta Predictive resource management of multiple monitoring applications . . . . 788--801 Richard T. B. Ma and Dah Ming Chiu and John C. S. Lui and Vishal Misra and Dan Rubenstein On cooperative settlement between content, transit, and eyeball Internet service providers . . . . . . . . . . . 802--815 Libin Jiang and Jean Walrand Approaching throughput-optimality in distributed CSMA scheduling algorithms with collisions . . . . . . . . . . . . 816--829 Brice Augustin and Timur Friedman and Renata Teixeira Measuring multipath routing in the Internet . . . . . . . . . . . . . . . . 830--840 Lei Ying and Sanjay Shakkottai and Aneesh Reddy and Shihuan Liu On combining shortest-path and back-pressure routing over multihop wireless networks . . . . . . . . . . . 841--854 Shuyi Chen and Kaustubh R. Joshi and Matti A. Hiltunen and Richard D. Schlichting and William H. Sanders Using link gradients to predict the impact of network latency on multitier applications . . . . . . . . . . . . . . 855--868 Sameh Sorour and Shahrokh Valaee An adaptive network coded retransmission scheme for single-hop wireless multicast broadcast services . . . . . . . . . . . 869--878 Sushant Sharma and Yi Shi and Y. Thomas Hou and Sastry Kompella An optimal algorithm for relay node assignment in cooperative ad hoc networks . . . . . . . . . . . . . . . . 879--892 Chi-Kin Chau and Minghua Chen and Soung Chang Liew Capacity of large-scale CSMA wireless networks . . . . . . . . . . . . . . . . 893--906 Péter Babarczi and János Tapolcai and Pin-Han Ho Adjacent link failure localization with monitoring trails in all-optical mesh networks . . . . . . . . . . . . . . . . 907--920 Ming Xia and Massimo Tornatore and Charles U. Martel and Biswanath Mukherjee Risk-aware provisioning for optical WDM mesh networks . . . . . . . . . . . . . 921--931
Arun Vishwanath and Vijay Sivaraman and George N. Rouskas Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers . . . . . . . . 933--946 Ren-Shiou Liu and Kai-Wei Fan and Zizhan Zheng and Prasun Sinha Perpetual and fair data collection for environmental energy harvesting sensor networks . . . . . . . . . . . . . . . . 947--960 Zhipeng Yang and Hongyi Wu FINDERS: a featherlight information network with delay-endurable RFID support . . . . . . . . . . . . . . . . 961--974 Sherif M. ElRakabawy and Christoph Lindemann A practical adaptive pacing scheme for TCP in multihop wireless networks . . . 975--988 Satyajeet S. Ahuja and Srinivasan Ramasubramanian and Marwan Krunz SRLG failure localization in optical networks . . . . . . . . . . . . . . . . 989--999 Kayi Lee and Eytan Modiano and Hyang-Won Lee Cross-layer survivability in WDM-based networks . . . . . . . . . . . . . . . . 1000--1013 Jingjing Zhang and Nirwan Ansari Scheduling hybrid WDM/TDM passive optical networks with nonzero laser tuning time . . . . . . . . . . . . . . 1014--1027 June Hwang and Seong-Lyun Kim Cross-layer optimization and network coding in CSMA/CA-based wireless multihop networks . . . . . . . . . . . 1028--1042 Almut Burchard and Jörg Liebeherr and Florin Ciucu On superlinear scaling of network delays 1043--1056 Shihuan Liu and Lei Ying and R. Srikant Throughput-optimal opportunistic scheduling in the presence of flow-level dynamics . . . . . . . . . . . . . . . . 1057--1070 Ahmed E. Kamal and Aditya Ramamoorthy and Long Long and Shizheng Li Overlay protection against link failures using network coding . . . . . . . . . . 1071--1084 Luca Cittadini and Giuseppe Di Battista and Massimo Rimondini and Stefano Vissicchio Wheel $+$ ring $=$ reel: the impact of route filtering on the stability of policy routing . . . . . . . . . . . . . 1085--1096 Saqib Raza and Yuanbo Zhu and Chen-Nee Chuah Graceful network state migrations . . . 1097--1110 Chi-Kin Chau and Prithwish Basu Analysis of latency of stateless opportunistic forwarding in intermittently connected networks . . . 1111--1124 Juan José Jaramillo and R. Srikant Optimal scheduling for fair resource allocation in ad hoc networks with elastic and inelastic traffic . . . . . 1125--1136 Rahul Urgaonkar and Michael J. Neely Network capacity region and minimum energy function for a delay-tolerant mobile ad hoc network . . . . . . . . . 1137--1150 Riccardo Giacomelli and Radha Krishna Ganti and Martin Haenggi Outage probability of general ad hoc networks in the high-reliability regime 1151--1163 Shao-Cheng Wang and Ahmed Helmy BEWARE: background traffic-aware rate adaptation for IEEE 802.11 . . . . . . . 1164--1177 Adel Aziz and David Starobinski and Patrick Thiran Understanding and tackling the root causes of instability in wireless mesh networks . . . . . . . . . . . . . . . . 1178--1193 Tian Lan and Xiaojun Lin and Mung Chiang and Ruby B. Lee Stability and benefits of suboptimal utility maximization . . . . . . . . . . 1194--1207 Konstantinos Pelechrinis and Ioannis Broustis and Srikanth V. Krishnamurthy and Christos Gkantsidis A measurement-driven anti-jamming system for 802.11 networks . . . . . . . . . . 1208--1222 M. Kodialam and T. V. Lakshman and James B. Orlin and Sudipta Sengupta End-to-end restorable oblivious routing of hose model traffic . . . . . . . . . 1223--1236 Minsik Lee and Youngjip Kim and Chong-Ho Choi Period-controlled MAC for high performance in wireless networks . . . . 1237--1250
MyungKeun Yoon and Tao Li and Shigang Chen and Jih-Kwon Peir Fit a compact spread estimator in small high-speed memory . . . . . . . . . . . 1253--1264 Reuven Cohen and Niloofar Fazlollahi and David Starobinski Throughput-competitive advance reservation with bounded path dispersion 1265--1275 Ketan Rajawat and Nikolaos Gatsis and Georgios B. Giannakis Cross-layer designs in coded wireless fading networks with multicast . . . . . 1276--1289 Christina Aperjis and Ramesh Johari and Michael J. Freedman Bilateral and multilateral exchanges for peer-assisted content distribution . . . 1290--1303 Marwan Batayneh and Dominic A. Schupke and Marco Hoffmann and Andreas Kirstaedter and Biswanath Mukherjee On routing and transmission-range determination of multi-bit-rate signals over mixed-line-rate WDM optical networks for carrier Ethernet . . . . . 1304--1316 Chuan Wu and Baochun Li and Shuqiao Zhao On dynamic server provisioning in multichannel P2P live streaming . . . . 1317--1330 Melih Onus and Andréa W. Richa Minimum maximum-degree publish-subscribe overlay network design . . . . . . . . . 1331--1343 Donghyun Kim and Wei Wang and Nassim Sohaee and Changcun Ma and Weili Wu and Wonjun Lee and Ding-Zhu Du Minimum data-latency-bound $k$-sink placement problem in wireless sensor networks . . . . . . . . . . . . . . . . 1344--1353 Xinbing Wang and Wentao Huang and Shangxing Wang and Jinbei Zhang and Chenhui Hu Delay and capacity tradeoff analysis for motioncast . . . . . . . . . . . . . . . 1354--1367 Dimitrios Koutsonikolas and Chih-Chun Wang and Y. Charlie Hu Efficient network-coding-based opportunistic routing through cumulative coded acknowledgments . . . . . . . . . 1368--1381 Bo Li and Cem Boyaci and Ye Xia A refined performance characterization of longest-queue-first policy in wireless networks . . . . . . . . . . . 1382--1395 Joanne Treurniet A network activity classification schema and its application to scan detection 1396--1404 Zhenyu Wu and Mengjun Xie and Haining Wang Design and implementation of a fast dynamic packet filter . . . . . . . . . 1405--1419 Amogh Dhamdhere and Constantine Dovrolis Twelve years in the evolution of the Internet ecosystem . . . . . . . . . . . 1420--1433 Ovidiu Valentin Drugan and Thomas Plagemann and Ellen Munthe-Kaas Detecting communities in sparse MANETs 1434--1447 Dan Li and Jianping Wu and Jiangchuan Liu and Yong Cui and Ke Xu Defending against distance cheating in link-weighted application-layer multicast . . . . . . . . . . . . . . . 1448--1457 François Baccelli and Nicholas Bambos and Nicolas Gast Distributed delay-power control algorithms for bandwidth sharing in wireless networks . . . . . . . . . . . 1458--1471 Ying Jian and Ming Zhang and Shigang Chen Achieving MAC-layer fairness in CSMA/CA networks . . . . . . . . . . . . . . . . 1472--1484 Qinglin Zhao and Danny H. K. Tsang and Taka Sakurai A simple critical-load-based CAC scheme for IEEE 802.11 DCF networks . . . . . . 1485--1498 Marios Lestas and Andreas Pitsillides and Petros Ioannou and George Hadjipollas A new estimation scheme for the effective number of users in Internet congestion control . . . . . . . . . . . 1499--1512 Sumit Singh and Raghuraman Mudumbai and Upamanyu Madhow Interference analysis for highly directional 60-GHz mesh networks: the case for rethinking medium access control . . . . . . . . . . . . . . . . 1513--1527 Chandramani Singh and Saswati Sarkar and Alireza Aram Provider-customer coalitional games . . 1528--1542 Kin-Wah Kwong and Lixin Gao and Roch Guérin and Zhi-Li Zhang On the feasibility and efficacy of protection routing in IP networks . . . 1543--1556 Steven Gianvecchio and Mengjun Xie and Zhenyu Wu and Haining Wang Humans and bots in Internet chat: measurement, analysis, and automated classification . . . . . . . . . . . . . 1557--1571
J. J. Garcia-Luna-Aceves and Rolando Menchaca-Mendez PRIME: an interest-driven approach to integrated unicast and multicast routing in MANETs . . . . . . . . . . . . . . . 1573--1586 Frédérique Oggier and Hanane Fathi An authentication code against pollution attacks in network coding . . . . . . . 1587--1596 Loc X. Bui and R. Srikant and Alexander Stolyar A novel architecture for reduction of delay and queueing structure complexity in the back-pressure algorithm . . . . . 1597--1609 Sebastian Neumayer and Gil Zussman and Reuven Cohen and Eytan Modiano Assessing the vulnerability of the fiber infrastructure to disasters . . . . . . 1610--1623 Georgios Smaragdakis and Nikolaos Laoutaris and Vassilis Lekakis and Azer Bestavros and John W. Byers and Mema Roussopoulos Selfish overlay network creation and maintenance . . . . . . . . . . . . . . 1624--1637 Gianni Giorgetti and Sandeep Kumar S. Gupta and Gianfranco Manes Understanding the limits of RF-based collaborative localization . . . . . . . 1638--1651 Sanaz Barghi and Hamid Jafarkhani and Homayoun Yousefi'zadeh MIMO-assisted MPR-aware MAC design for asynchronous WLANs . . . . . . . . . . . 1652--1665 Andrew J. Kalafut and Craig A. Shue and Minaxi Gupta Touring DNS open houses for trends and configurations . . . . . . . . . . . . . 1666--1675 Dragana Damjanovic and Michael Welzl An extension of the TCP steady-state throughput equation for parallel flows and its application in MulTFRC . . . . . 1676--1689 Balaji Rengarajan and Gustavo De Veciana Practical adaptive user association policies for wireless systems with dynamic interference . . . . . . . . . . 1690--1703 Chao Liang and Miao Zhao and Yong Liu Optimal bandwidth sharing in multiswarm multiparty P2P video-conferencing systems . . . . . . . . . . . . . . . . 1704--1716 Dahai Xu and Mung Chiang and Jennifer Rexford Link-state routing with hop-by-hop forwarding can achieve optimal traffic engineering . . . . . . . . . . . . . . 1717--1730 Amitabha Ghosh and Özlem Durmaz Incel and V. S. Anil Kumar and Bhaskar Krishnamachari Multichannel scheduling and spanning trees: throughput-delay tradeoff for fast data collection in sensor networks 1731--1744 Delia Ciullo and Valentina Martina and Michele Garetto and Emilio Leonardi Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks . . . . . . . . . . . . 1745--1758 Konstantinos Christodoulopoulos and Panagiotis Kokkinos and Emmanouel Manos Varvarigos Indirect and direct multicost algorithms for online impairment-aware RWA . . . . 1759--1772 Lei Ying and R. Srikant and Don Towsley and Shihuan Liu Cluster-based back-pressure routing algorithm . . . . . . . . . . . . . . . 1773--1786 Dezun Dong and Mo Li and Yunhao Liu and Xiang-Yang Li and Xiangke Liao Topological detection on wormholes in wireless ad hoc and sensor networks . . 1787--1796 Sumit Rangwala and Apoorva Jindal and Ki-Young Jang and Konstantinos Psounis and Ramesh Govindan Neighborhood-centric congestion control for multihop wireless mesh networks . . 1797--1810 Lukasz Budzisz and Rade Stanojevi\'c and Arieh Schlote and Fred Baker and Robert Shorten On the fair coexistence of loss- and delay-based TCP . . . . . . . . . . . . 1811--1824 Murali Kodialam and T. V. Lakshman and Sarit Mukherjee and Limin Wang Online scheduling of targeted advertisements for IPTV . . . . . . . . 1825--1834 Kayi Lee and Hyang-Won Lee and Eytan Modiano Reliability in layered networks with random link failures . . . . . . . . . . 1835--1848 Meng Wang and Chee Wei Tan and Weiyu Xu and Ao Tang Cost of not splitting in routing: characterization and estimation . . . . 1849--1859 Pu Wang and Ian F. Akyildiz Spatial correlation and mobility-aware traffic modeling for wireless sensor networks . . . . . . . . . . . . . . . . 1860--1873
Neal Charbonneau and Vinod M. Vokkarane Static routing and wavelength assignment for multicast advance reservation in all-optical wavelength-routed WDM networks . . . . . . . . . . . . . . . . 1--14 Hanan Shpungin and Zongpeng Li Throughput and energy efficiency in wireless ad hoc networks with Gaussian channels . . . . . . . . . . . . . . . . 15--28 Binbin Chen and Ziling Zhou and Yuda Zhao and Haifeng Yu Efficient error estimating coding: feasibility and applications . . . . . . 29--44 Saqib Raza and Guanyao Huang and Chen-Nee Chuah and Srini Seetharaman and Jatinder Pal Singh MeasuRouting: a framework for routing assisted traffic monitoring . . . . . . 45--56 Peilong Li and Honghai Zhang and Baohua Zhao and Sampath Rangarajan Scalable video multicast with adaptive modulation and coding in broadband wireless data systems . . . . . . . . . 57--68 Chandramani Singh and Saswati Sarkar and Alireza Aram and Anurag Kumar Cooperative profit sharing in coalition-based resource allocation in wireless networks . . . . . . . . . . . 69--83 Kai Chen and Chuanxiong Guo and Haitao Wu and Jing Yuan and Zhenqian Feng and Yan Chen and Songwu Lu and Wenfei Wu DAC: generic and automatic address configuration for data center networks 84--99 Arun Sridharan and C. Emre Koksal and Elif Uysal-Biyikoglu A greedy link scheduler for wireless networks with Gaussian multiple-access and broadcast channels . . . . . . . . . 100--113 Ferhat Dikbiyik and Laxman Sahasrabuddhe and Massimo Tornatore and Biswanath Mukherjee Exploiting excess capacity to improve robustness of WDM mesh networks . . . . 114--124 Minlan Yu and Marina Thottan and Li Li Latency equalization as a new network service primitive . . . . . . . . . . . 125--138 Myungjin Lee and Nick Duffield and Ramana Rao Kompella Opportunistic flow-level latency estimation using consistent netflow . . 139--152 Sangman Cho and Theodore Elhourani and Srinivasan Ramasubramanian Independent directed acyclic graphs for resilient multipath routing . . . . . . 153--162 Berk Birand and Maria Chudnovsky and Bernard Ries and Paul Seymour and Gil Zussman and Yori Zwols Analyzing the performance of greedy maximal scheduling via local pooling and graph theory . . . . . . . . . . . . . . 163--176 Hongseok Kim and Gustavo De Veciana and Xiangying Yang and Muthaiah Venkatachalam Distributed $ \alpha $-optimal user association and cell load balancing in wireless networks . . . . . . . . . . . 177--190 Giuseppe Campobello and Alessandro Leonardi and Sergio Palazzo Improving energy saving and reliability in wireless sensor networks using a simple CRT-based packet-forwarding solution . . . . . . . . . . . . . . . . 191--205 Mosharaf Chowdhury and Muntasir Raihan Rahman and Raouf Boutaba ViNEYard: virtual network embedding algorithms with coordinated node and link mapping . . . . . . . . . . . . . . 206--219 Craig A. Shue and Andrew J. Kalafut and Minaxi Gupta Abnormally malicious autonomous systems and their Internet connectivity . . . . 220--230 Julien Ridoux and Darryl Veitch and Timothy Broomhead The case for feed-forward clock synchronization . . . . . . . . . . . . 231--242 Abhijeet A. Bhorkar and Mohammad Naghshvar and Tara Javidi and Bhaskar D. Rao Adaptive opportunistic routing for wireless ad hoc networks . . . . . . . . 243--256 Hayang Kim and Xiaoli Ma and Benjamin Russell Hamilton Tracking low-precision clocks with time-varying drifts using Kalman filtering . . . . . . . . . . . . . . . 257--270 Yihua He and Michalis Faloutsos and Srikanth V. Krishnamurthy and Marek Chrobak Obtaining provably legitimate Internet topologies . . . . . . . . . . . . . . . 271--284 Matthew Andrews and Antonio Fernández Anta and Lisa Zhang and Wenbo Zhao Routing for power minimization in the speed scaling model . . . . . . . . . . 285--294 Fang Hao and Murali Kodialam and T. V. Lakshman and Haoyu Song Fast dynamic multiple-set membership testing using combinatorial Bloom filters . . . . . . . . . . . . . . . . 295--304 Yunbo Wang and Mehmet C. Vuran and Steve Goddard Cross-layer analysis of the end-to-end delay distribution in wireless sensor networks . . . . . . . . . . . . . . . . 305--318
Wei Wei and Sharad Jaiswal and Jim Kurose and Don Towsley and Kyoungwon Suh and Bing Wang Identifying 802.11 traffic from passive measurements using iterative Bayesian inference . . . . . . . . . . . . . . . 325--338 Sungho Yun and Constantine Caramanis System-level optimization in wireless networks: managing interference and uncertainty via robust optimization . . 339--352 Justin Manweiler and Naveen Santhapuri and Souvik Sen and Romit Roy Choudhury and Srihari Nelakuditi and Kamesh Munagala Order matters: transmission reordering in wireless networks . . . . . . . . . . 353--366 Bridge Qiao Zhao and John C. S. Lui and Dah-Ming Chiu A mathematical framework for analyzing adaptive incentive protocols in P2P networks . . . . . . . . . . . . . . . . 367--380 Fabio Soldo and Katerina Argyraki and Athina Markopoulou Optimal source-based filtering of malicious traffic . . . . . . . . . . . 381--395 Mukundan Venkataraman and Mainak Chatterjee Quantifying video-QoE degradations of Internet links . . . . . . . . . . . . . 396--407 Guoqiang Mao and Brian D. O. Anderson Towards a better understanding of large-scale network models . . . . . . . 408--421 Michael Menth and Frank Lehrieder Performance of PCN-based admission control under challenging conditions . . 422--435 Miklós Reiter and Richard Steinberg Congestion-dependent pricing and forward contracts for complementary segments of a communication network . . . . . . . . 436--449 Rui Tan and Guoliang Xing and Benyuan Liu and Jianping Wang and Xiaohua Jia Exploiting data fusion to improve the coverage of wireless sensor networks . . 450--462 Luca Chiaraviglio and Marco Mellia and Fabio Neri Minimizing ISP network energy cost: formulation and solutions . . . . . . . 463--476 Niv Buchbinder and Liane Lewin-Eytan and Ishai Menache and Joseph Naor and Ariel Orda Dynamic power allocation under arbitrary varying channels: an online approach . . 477--487 Chad R. Meiners and Alex X. Liu and Eric Torng Bit weaving: a non-prefix approach to compressing packet classifiers in TCAMs 488--500 Eric Jung and Xin Liu Opportunistic spectrum access in multiple-primary-user environments under the packet collision constraint . . . . 501--514 Kyunghan Lee and Seongik Hong and Seong Joon Kim and Injong Rhee and Song Chong SLAW: self-similar least-action human walk . . . . . . . . . . . . . . . . . . 515--529 Tao Shu and Marwan Krunz Finding cheap routes in profit-driven opportunistic spectrum access networks: a truthful mechanism design approach . . 530--543 Souvik Sen and Romit Roy Choudhury and Srihari Nelakuditi CSMA/CN: carrier sense multiple access with collision notification . . . . . . 544--556 Beakcheol Jang and Mihail L. Sichitiu IEEE 802.11 saturation throughput analysis in the presence of hidden terminals . . . . . . . . . . . . . . . 557--570 Ahmed Elmokashfi and Amund Kvalbein and Constantine Dovrolis BGP churn evolution: a perspective from the core . . . . . . . . . . . . . . . . 571--584 Ermin Kozica and W. Bastiaan Kleijn A quantization theoretic perspective on simulcast and layered multicast optimization . . . . . . . . . . . . . . 585--593 Costas Courcoubetis and Richard Weber Economic issues in shared infrastructures . . . . . . . . . . . . 594--608 Thang N. Dinh and Ying Xuan and My T. Thai and Panos M. Pardalos and Taieb Znati On new approaches of assessing network vulnerability: hardness and approximation . . . . . . . . . . . . . 609--619 Giovanna Carofiglio and Luca Muscariello On the impact of TCP and per-flow scheduling on Internet performance . . . 620--633
Khandoker Nadim Parvez and Carey Williamson and Anirban Mahanti and Niklas Carlsson Insights on media streaming progress using BitTorrent-like protocols for on-demand streaming . . . . . . . . . . 637--650 Lili Cao and Haitao Zheng Balancing reliability and utilization in dynamic spectrum access . . . . . . . . 651--661 Matthew Roughan and Yin Zhang and Walter Willinger and Lili Qiu Spatio-temporal compressive sensing and Internet traffic matrices . . . . . . . 662--676 João Luís Sobrinho and Tiago Quelhas A theory for the connectivity discovered by routing protocols . . . . . . . . . . 677--689 XiaoHua Xu and Xiang-Yang Li and Peng-Jun Wan and ShaoJie Tang Efficient scheduling for periodic aggregation queries in multihop sensor networks . . . . . . . . . . . . . . . . 690--698 Masanori Bando and N. Sertac Artan and H. Jonathan Chao Scalable lookahead regular expression detection system for deep packet inspection . . . . . . . . . . . . . . . 699--714 Sanjeev Khanna and Santosh S. Venkatesh and Omid Fatemieh and Fariba Khan and Carl A. Gunter Adaptive selective verification: an efficient adaptive countermeasure to thwart DoS attacks . . . . . . . . . . . 715--728 Fong Pong and Nian-Feng Tzeng Concise lookup tables for IPv4 and IPv6 longest prefix matching in scalable routers . . . . . . . . . . . . . . . . 729--741 Rafael Laufer and Henri Dubois-Ferri\`ere and Leonard Kleinrock Polynomial-time algorithms for multirate anypath routing in wireless multihop networks . . . . . . . . . . . . . . . . 742--755 Douglas J. Leith and Qizhi Cao and Vijay G. Subramanian Max-min fairness in 802.11 mesh networks 756--769 Changbin Liu and Ricardo Correa and Xiaozhou Li and Prithwish Basu and Boon Thau Loo and Yun Mao Declarative policy-based adaptive mobile ad hoc networking . . . . . . . . . . . 770--783 Edoardo Amaldi and Antonio Capone and Matteo Cesana and Ilario Filippini Design of wireless sensor networks for mobile target detection . . . . . . . . 784--797 Samir Sebbah and Brigitte Jaumard Differentiated quality-of-recovery in survivable optical mesh networks using $p$-structures . . . . . . . . . . . . . 798--810 Ramana Rao Kompella and Kirill Levchenko and Alex C. Snoeren and George Varghese Router support for fine-grained latency measurements . . . . . . . . . . . . . . 811--824 Jian Ni and Bo Tan and R. Srikant Q-CSMA: queue-length-based CSMA/CA algorithms for achieving maximum throughput and low delay in wireless networks . . . . . . . . . . . . . . . . 825--836 Wei Wang and Kang G. Shin and Wenbo Wang Distributed resource allocation based on queue balancing in multihop cognitive radio networks . . . . . . . . . . . . . 837--850 Yi Zhu and Jason P. Jue Reliable collective communications with weighted SRLGs in optical networks . . . 851--863 Guang Tan and Anne-Marie Kermarrec Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach . . . . . . . . . 864--877 Siamak Sorooshyari and Chee Wei Tan and Mung Chiang Power control for cognitive radio networks: axioms, algorithms, and analysis . . . . . . . . . . . . . . . . 878--891 Parv Venkitasubramaniam and Lang Tong A game-theoretic approach to anonymous networking . . . . . . . . . . . . . . . 892--905 Abishek Gopalan and Srinivasan Ramasubramanian On identifying additive link metrics using linearly independent cycles and paths . . . . . . . . . . . . . . . . . 906--916 Xinbing Wang and Luoyi Fu and Chenhui Hu Multicast performance with hierarchical cooperation . . . . . . . . . . . . . . 917--930 Brian Eriksson and Gautam Dasarathy and Paul Barford and Robert Nowak Efficient network tomography for Internet topology discovery . . . . . . 931--943 Dan Li and Yuanjie Li and Jianping Wu and Sen Su and Jiangwei Yu ESM: efficient and scalable data center multicast routing . . . . . . . . . . . 944--955 Zizhan Zheng and Prasun Sinha and Santosh Kumar Sparse WiFi deployment for vehicular Internet access with bounded interconnection gap . . . . . . . . . . 956--969 Anat Bremler-Barr and Yaron Koral Accelerating multipattern matching on compressed HTTP traffic . . . . . . . . 970--983
Cataldo Basile and Alberto Cappadonia and Antonio Lioy Network-level access control policy analysis and transformation . . . . . . 985--998 Diego Passos and Celio V. N. Albuquerque A joint approach to routing metrics and rate adaptation in wireless mesh networks . . . . . . . . . . . . . . . . 999--1009 Ionut Trestian and Supranamaya Ranjan and Aleksandar Kuzmanovic and Antonio Nucci Taming the mobile data deluge with drop zones . . . . . . . . . . . . . . . . . 1010--1023 Vicky Sharma and Koushik Kar and K. K. Ramakrishnan and Shivkumar Kalyanaraman A transport protocol to exploit multipath diversity in wireless networks 1024--1039 Hao Wang and Haiquan Zhao and Bill Lin and Jun Xu DRAM-based statistics counter array architecture with performance guarantee 1040--1053 Yi Shi and Y. Thomas Hou Some fundamental results on base station movement problem for wireless sensor networks . . . . . . . . . . . . . . . . 1054--1067 Ashwini Kumar and Kang G. Shin DSASync: managing end-to-end connections in dynamic spectrum access wireless LANs 1068--1081 Sharanya Eswaran and Archan Misra and Thomas F. La Porta Control-theoretic utility maximization in multihop wireless networks under mission dynamics . . . . . . . . . . . . 1082--1095 Krishna Jagannathan and Mihalis Markakis and Eytan Modiano and John N. Tsitsiklis Queue-length asymptotics for generalized max-weight scheduling in the presence of heavy-tailed traffic . . . . . . . . . . 1096--1111 Bin Li and Atilla Eryilmaz Exploring the throughput boundaries of randomized schedulers in wireless networks . . . . . . . . . . . . . . . . 1112--1124 Evangelos Bampas and Aris Pagourtzis and George Pierrakos and Katerina Potika On a noncooperative model for wavelength assignment in multifiber optical networks . . . . . . . . . . . . . . . . 1125--1137 Jung Ryu and Lei Ying and Sanjay Shakkottai Timescale decoupled routing and rate control in intermittently connected networks . . . . . . . . . . . . . . . . 1138--1151 Gabriel Y. Keung and Bo Li and Qian Zhang The intrusion detection in mobile sensor network . . . . . . . . . . . . . . . . 1152--1161 Josep M. Pujol and Vijay Erramilli and Georgos Siganos and Xiaoyuan Yang and Nikolaos Laoutaris and Parminder Chhabra and Pablo Rodriguez The little engine(s) that could: scaling online social networks . . . . . . . . . 1162--1175 Frank Lehrieder and György Dán and Tobias Hoßfeld and Simon Oechsner and Vlad Singeorzan Caching for BitTorrent-like P2P systems: a simple fluid model and its implications . . . . . . . . . . . . . . 1176--1189 Hongbo Jiang and Arun Iyengar and Erich Nahum and Wolfgang Segmuller and Asser N. Tantawi and Charles P. Wright Design, implementation, and performance of a load balancer for SIP server clusters . . . . . . . . . . . . . . . . 1190--1202 Apoorva Jindal and Mingyan Liu Networked computing in wireless sensor networks for structural health monitoring . . . . . . . . . . . . . . . 1203--1216 Charles Shen and Erich Nahum and Henning Schulzrinne and Charles P. Wright The impact of TLS on SIP server performance: measurement and modeling 1217--1230 Daniel Medina and Felix Hoffmann and Francesco Rossetto and Carl-Herbert Rokitansky A geographic routing strategy for North Atlantic in-flight Internet access via airborne mesh networking . . . . . . . . 1231--1244 Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Dong Xuan and Weijia Jia A new cell-counting-based attack against Tor . . . . . . . . . . . . . . . . . . 1245--1261 Masanori Bando and Yi-Li Lin and H. Jonathan Chao FlashTrie: beyond 100-Gb/s IP route lookup using hash-based prefix-compressed trie . . . . . . . . . 1262--1275 Cai Hong Kai and Soung Chang Liew Applications of belief propagation in CSMA wireless networks . . . . . . . . . 1276--1289 Guowang Miao and Ye Li and Ananthram Swami Channel-aware distributed medium access control . . . . . . . . . . . . . . . . 1290--1303 Pan Li and Miao Pan and Yuguang Fang Capacity bounds of three-dimensional wireless ad hoc networks . . . . . . . . 1304--1315 Long Bao Le and Eytan Modiano and Ness B. Shroff Optimal control of wireless networks with finite buffers . . . . . . . . . . 1316--1329
Ravi Kokku and Rajesh Mahindra and Honghai Zhang and Sampath Rangarajan NVS: a substrate for virtualizing wireless resources in cellular networks 1333--1346 M. H. R. Khouzani and Saswati Sarkar and Eitan Altman Maximum damage malware attack in mobile wireless networks . . . . . . . . . . . 1347--1360 Alex Sherman and Jason Nieh and Clifford Stein FairTorrent: a deficit-based distributed algorithm to ensure fairness in peer-to-peer systems . . . . . . . . . . 1361--1374 Dimitrios Koutsonikolas and Y. Charlie Hu and Chih-Chun Wang Pacifier: high-throughput, reliable multicast without ``Crying babies'' in wireless mesh networks . . . . . . . . . 1375--1388 Wei Chen and Khaled B. Letaief and Zhigang Cao Buffer-aware network coding for wireless networks . . . . . . . . . . . . . . . . 1389--1401 Yang Qin and Lie-Liang Yang Steady-state throughput analysis of network coding nodes employing stop-and-wait automatic repeat request 1402--1411 Yongkun Li and Bridge Qiao Zhao and John C. S. Lui On modeling product advertisement in large-scale online social networks . . . 1412--1425 Danhua Guo and Laxmi Narayan Bhuyan and Bin Liu An efficient parallelized L7-filter design for multicore servers . . . . . . 1426--1439 Murtaza Zafer and Dakshi Agrawal and Mudhakar Srivatsa Limitations of generating a secret key using wireless fading under active adversary . . . . . . . . . . . . . . . 1440--1451 Joseph Camp and Ehsan Aryafar and Edward Knightly Coupled 802.11 flows in urban channels: model and experimental evaluation . . . 1452--1465 Yi Gai and Bhaskar Krishnamachari and Rahul Jain Combinatorial network optimization with unknown variables: multi-armed bandits with linear rewards and individual observations . . . . . . . . . . . . . . 1466--1478 Danail Traskov and Michael Heindlmaier and Muriel Médard and Ralf Koetter Scheduling for network-coded multicast 1479--1488 Haoyu Song and Murali Kodialam and Fang Hao and T. V. Lakshman Efficient trie braiding in scalable virtual routers . . . . . . . . . . . . 1489--1500 Wentao Huang and Xinbing Wang Capacity scaling of general cognitive networks . . . . . . . . . . . . . . . . 1501--1513 Mhameed Aezladen and Reuven Cohen and Danny Raz Efficient location-based decision-supporting content distribution to mobile groups . . . . . . . . . . . . 1514--1526 Mohammad A. Saleh and Ahmed E. Kamal Approximation algorithms for many-to-many traffic grooming in optical WDM networks . . . . . . . . . . . . . . 1527--1540 Cem Tekin and Mingyan Liu and Richard Southwell and Jianwei Huang and Sahand Haji Ali Ahmad Atomic congestion games on graphs and their applications in networking . . . . 1541--1552 Wei Gao and Qinghua Li and Bo Zhao and Guohong Cao Social-aware multicast in disruption-tolerant networks . . . . . . 1553--1566 Ramon Aparicio-Pardo and Nina Skorin-Kapov and Pablo Pavon-Marino and Belen Garcia-Manrubia (Non-)reconfigurable virtual topology design under multihour traffic in optical networks . . . . . . . . . . . . 1567--1580 Khoa Tran Phan and Jaeok Park and Mihaela Van Der Schaar Near-optimal deviation-proof medium access control designs in wireless networks . . . . . . . . . . . . . . . . 1581--1594 Honghai Zhang and Yuanxi Jiang and Karthik Sundaresan and Sampath Rangarajan and Baohua Zhao Wireless multicast scheduling with switched beamforming antennas . . . . . 1595--1607 Shreeshankar Bodas and Sanjay Shakkottai and Lei Ying and R. Srikant Low-complexity scheduling algorithms for multichannel downlink wireless networks 1608--1621 Tao Li and Shigang Chen and Yibei Ling Per-flow traffic measurement through randomized counter sharing . . . . . . . 1622--1634 Eugenio Magistretti and Omer Gurewitz and Edward W. Knightly Measurement-driven modeling of transmission coordination for 802.11 online . . . . . . . . . . . . . . . . . 1635--1648 Ruogu Li and Atilla Eryilmaz Scheduling for end-to-end deadline-constrained traffic with reliability requirements in multihop networks . . . . . . . . . . . . . . . . 1649--1662 Sandeep Yadav and Ashwath Kumar Krishna Reddy and A. L. Narasimha Reddy and Supranamaya Ranjan Detecting algorithmically generated domain-flux attacks with DNS traffic analysis . . . . . . . . . . . . . . . . 1663--1677
Minghua Chen and Miroslav Ponec and Sudipta Sengupta and Jin Li and Philip A. Chou Utility maximization in peer-to-peer systems with applications to video conferencing . . . . . . . . . . . . . . 1681--1694 Bo Han and Lusheng Ji and Seungjoon Lee and Bobby Bhattacharjee and Robert R. Miller Are all bits equal?: experimental study of IEEE 802.11 communication bit errors 1695--1706 Lu Zhang and Xueyan Tang Optimizing client assignment for enhancing interactivity in distributed interactive applications . . . . . . . . 1707--1720 Ihsan Ayyub Qazi and Lachlan L. H. Andrew and Taieb Znati Congestion control with multipacket feedback . . . . . . . . . . . . . . . . 1721--1733 He Yan and Lee Breslau and Zihui Ge and Dan Massey and Dan Pei and Jennifer Yates G-RCA: a generic root cause analysis platform for service quality management in large IP networks . . . . . . . . . . 1734--1747 Liguang Xie and Yi Shi and Y. Thomas Hou and Hanif D. Sherali Making sensor networks immortal: an energy-renewal approach with wireless power transfer . . . . . . . . . . . . . 1748--1761 János Tapolcai and Pin-Han Ho and Lajos Rónyai and Bin Wu Network-wide local unambiguous failure localization (NWL-UFL) via monitoring trails . . . . . . . . . . . . . . . . . 1762--1773 Fei Chen and Alex X. Liu Privacy- and integrity-preserving range queries in sensor networks . . . . . . . 1774--1787 Daniela Brauckhoff and Xenofontas Dimitropoulos and Arno Wagner and Kavé Salamatian Anomaly extraction in backbone networks using association rules . . . . . . . . 1788--1799 Yong Ding and Yang Yang and Li Xiao Multisource video on-demand streaming in wireless mesh networks . . . . . . . . . 1800--1813 Anduo Wang and Limin Jia and Wenchao Zhou and Yiqing Ren and Boon Thau Loo and Jennifer Rexford and Vivek Nigam and Andre Scedrov and Carolyn Talcott FSR: formal analysis and implementation toolkit for safe interdomain routing . . 1814--1827 Jérôme François and Issam Aib and Raouf Boutaba FireCol: a collaborative protection network for the detection of flooding DDoS attacks . . . . . . . . . . . . . . 1828--1841 Laurent Vanbever and Stefano Vissicchio and Cristel Pelsser and Pierre Francois and Olivier Bonaventure Lossless migrations of link-state IGPs 1842--1855 Eitan Altman and Anurag Kumar and Chandramani Singh and Rajesh Sundaresan Spatial SINR games of base station placement and mobile association . . . . 1856--1869 George B. Mertzios and Ignasi Sau and Mordechai Shalom and Shmuel Zaks Placing regenerators in optical networks to satisfy multiple sets of requests . . 1870--1879 Thuy T. T. Nguyen and Grenville Armitage and Philip Branch and Sebastian Zander Timely and continuous machine-learning-based classification for interactive IP traffic . . . . . . . 1880--1894 Isaac Keslassy and Kirill Kogan and Gabriel Scalosub and Michael Segal Providing performance guarantees in multipass network processors . . . . . . 1895--1909 Jeff Seibert and Ruben Torres and Marco Mellia and Maurizio M. Munafo and Cristina Nita-Rotaru and Sanjay Rao The Internet-wide impact of P2P traffic localization on ISP profitability . . . 1910--1923 Weiyao Xiao and Sachin Agarwal and David Starobinski and Ari Trachtenberg Reliable rateless wireless broadcasting with near-zero feedback . . . . . . . . 1924--1937 Dominic DiPalantino and Ramesh Johari Traffic engineering with semiautonomous users: a game-theoretic perspective . . 1938--1949 Jiajia Liu and Xiaohong Jiang and Hiroki Nishiyama and Nei Kato Generalized two-hop relay for flexible delay control in MANETs . . . . . . . . 1950--1963 Ziqiu Yun and Xiaole Bai and Dong Xuan and Weijia Jia and Wei Zhao Pattern mutation in wireless sensor deployment . . . . . . . . . . . . . . . 1964--1977 Tao Li and Samuel S. Wu and Shigang Chen and Mark C. K. Yang Generalized energy-efficient algorithms for the RFID estimation problem . . . . 1978--1990 Gaurav S. Kasbekar and Yigal Bejerano and Saswati Sarkar Generic coverage verification without location information using dimension reduction . . . . . . . . . . . . . . . 1991--2004 Vinod Kone and Lei Yang and Xue Yang and Ben Y. Zhao and Haitao Zheng The effectiveness of opportunistic spectrum access: a measurement study . . 2005--2016
Mukarram Bin Tariq and Kaushik Bhandankar and Vytautas Valancius and Amgad Zeitoun and Nick Feamster and Mostafa Ammar Answering: techniques and deployment experience . . . . . . . . . . . . . . . 1--13 Yunyue Lin and Qishi Wu Complexity analysis and algorithm design for advance bandwidth scheduling in dedicated networks . . . . . . . . . . . 14--27 Youngmi Jin and George Kesidis and Ju Wook Jang Diffusion dynamics of network technologies with bounded rational users: aspiration-based learning . . . . 28--40 Michael J. Neely Delay-based network utility maximization 41--54 Sabato Manfredi and Francesco Oliviero and Simon Pietro Romano A distributed control law for load balancing in content delivery networks 55--68 Sudarshan Vasudevan and Micah Adler and Dennis Goeckel and Don Towsley Efficient algorithms for neighbor discovery in wireless networks . . . . . 69--83 Fangwen Fu and Ulas C. Kozat Stochastic game for wireless network virtualization . . . . . . . . . . . . . 84--97 Haoyu Song and Jonathan S. Turner ABC: adaptive binary cuttings for multidimensional packet classification 98--109 Juan Liu and Wei Chen and Ying Jun Zhang and Zhigang Cao A utility maximization framework for fair and efficient multicasting in multicarrier wireless cellular networks 110--120 Ting Zhu and Ziguo Zhong and Tian He and Zhi-Li Zhang Achieving efficient flooding by utilizing link correlation in wireless sensor networks . . . . . . . . . . . . 121--134 Yanhua Li and Zhi-Li Zhang Random walks and Green's function on digraphs: a framework for estimating wireless transmission costs . . . . . . 135--148 Xi Deng and Yuanyuan Yang and Sangjin Hong A flexible platform for hardware-aware network experiments and a case study on wireless network coding . . . . . . . . 149--161 Miao Wang and Lisong Xu and Byrav Ramamurthy Exploring the design space of multichannel peer-to-peer live video streaming systems . . . . . . . . . . . 162--175 Sung Hyun Chun and Richard J. La Secondary spectrum trading: auction-based framework for spectrum allocation and profit sharing . . . . . 176--189 Maxwell Young and Aniket Kate and Ian Goldberg and Martin Karsten Towards practical communication in Byzantine-resistant DHTs . . . . . . . . 190--203 Yong He and Jie Sun and Xiaojun Ma and Athanasios V. Vasilakos and Ruixi Yuan and Weibo Gong Semi-random backoff: towards resource reservation for channel access in wireless LANs . . . . . . . . . . . . . 204--217 Shaolei Ren and Jaeok Park and Mihaela Van Der Schaar Entry and spectrum sharing scheme selection in femtocell communications markets . . . . . . . . . . . . . . . . 218--232 Yipeng Zhou and Tom Z. J. Fu and Dah Ming Chiu On replication algorithm in P2P VoD . . 233--243 Eleftheria Athanasopoulou and Loc X. Bui and Tianxiong Ji and R. Srikant and Alexander Stolyar Back-pressure-based packet-by-packet adaptive routing in communication networks . . . . . . . . . . . . . . . . 244--257 Urtzi Ayesta and Martin Erausquin and Matthieu Jonckheere and Ina Maria Verloop Scheduling in a random environment: stability and asymptotic optimality . . 258--271 Shinuk Woo and Hwangnam Kim An empirical interference modeling for link reliability assessment in wireless networks . . . . . . . . . . . . . . . . 272--285 Bozidar Radunovic and Alexandre Proutiere On downlink capacity of cellular data networks with WLAN/WPAN relays . . . . . 286--296 György Dán and Niklas Carlsson Centralized and distributed protocols for tracker-based dynamic swarm management . . . . . . . . . . . . . . . 297--310 Jizhong Zhao and Wei Xi and Yuan He and Yunhao Liu and Xiang-Yang Li and Lufeng Mo and Zheng Yang Localization of wireless sensor networks in the wild: pursuit of ranging quality 311--323 C. Emre Koksal and Ozgur Ercetin and Yunus Sarikaya Control of wireless networks with secrecy . . . . . . . . . . . . . . . . 324--337
Haitao Wu and Zhenqian Feng and Chuanxiong Guo and Yongguang Zhang ICTCP: incast congestion control for TCP in data-center networks . . . . . . . . 345--358 Beatriz Lorenzo and Savo Glisic Context-aware nanoscale modeling of multicast multihop cellular networks . . 359--372 Victor M. Preciado and Ali Jadbabaie Moment-based spectral analysis of large-scale networks using local structural information . . . . . . . . . 373--382 Ken Keys and Young Hyun and Matthew Luckie and Kim Claffy Internet-scale IPv4 alias resolution with MIDAR . . . . . . . . . . . . . . . 383--399 Wei Cheng and Nan Zhang and Xiuzhen Cheng and Min Song and Dechang Chen Time-bounded essential localization for wireless sensor networks . . . . . . . . 400--412 Ammar Metnani and Brigitte Jaumard Stability of FIPP $p$-cycles under dynamic traffic in WDM networks: dynamic traffic,failure-independent path-protecting (FIPP) $p$-cycles,path protection,shared bandwidth protection,stability of protection structures . . . . . . . . . . . . . . . 413--425 Xinyu Zhang and Kang G. Shin Cooperative carrier signaling: harmonizing coexisting WPAN and WLAN devices . . . . . . . . . . . . . . . . 426--439 Xinbing Wang and Xiaojun Lin and Qingsi Wang and Wentao Luan Mobility increases the connectivity of wireless networks . . . . . . . . . . . 440--454 Ece Gelal and Jianxia Ning and Konstantinos Pelechrinis and Tae-Suk Kim and Ioannis Broustis and Srikanth V. Krishnamurthy and Bhaskar D. Rao Topology control for effective interference cancellation in multiuser MIMO networks . . . . . . . . . . . . . 455--468 Nikolaos M. Freris and Cheng-Hsin Hsu and Jatinder Pal Singh and Xiaoqing Zhu Distortion-aware scalable video streaming to multinetwork clients . . . 469--481 Eitan Altman and Amar Prakash Azad and Tamer Basar and Francesco De Pellegrini Combined optimal control of activation and transmission in delay-tolerant networks . . . . . . . . . . . . . . . . 482--494 Po-Kai Huang and Xiaojun Lin and Chih-Chun Wang A low-complexity congestion control and scheduling algorithm for multihop wireless networks with order-optimal per-flow delay . . . . . . . . . . . . . 495--508 Brad W. Zarikoff and Douglas J. Leith Measuring pulsed interference in 802.11 links . . . . . . . . . . . . . . . . . 509--521 Lei Yang and Hongseok Kim and Junshan Zhang and Mung Chiang and Chee Wei Tan Pricing-based decentralized spectrum access control in cognitive radio networks . . . . . . . . . . . . . . . . 522--535 Kyunghan Lee and Joohyun Lee and Yung Yi and Injong Rhee and Song Chong Mobile data offloading: how much can WiFi deliver? . . . . . . . . . . . . . 536--550 Alex X. Liu and Amir R. Khakpour Quantifying and verifying reachability for access controlled networks . . . . . 551--565 Bo Tan and Laurent Massoulié Optimal content placement for peer-to-peer video-on-demand systems . . 566--579 Daniel S. Menasche and Antonio A. De A.Rocha and Bin Li and Don Towsley and Arun Venkataramani Content availability and bundling in swarming systems . . . . . . . . . . . . 580--593 Eric Rozner and Mi Kyung Han and Lili Qiu and Yin Zhang Model-driven optimization of opportunistic routing . . . . . . . . . 594--609 Andrea Clementi and Francesco Pasquale and Riccardo Silvestri Opportunistic MANETs: mobility can make up for low transmission power . . . . . 610--620 Qianhong Wu and Bo Qin and Lei Zhang and Josep Domingo-Ferrer and Jesús A. Manjón Fast transmission to remote cooperative groups: a new key management paradigm 621--633 Bo Ji and Changhee Joo and Ness B. Shroff Throughput-optimal scheduling in multihop wireless networks without per-flow information . . . . . . . . . . 634--647 Malati Hegde and Pavan Kumar and K. R. Vasudev and N. N. Sowmya and S. V. R. Anand and Anurag Kumar and Joy Kuri Experiences with a centralized scheduling approach for performance management of IEEE 802.11 wireless LANs 648--662 Simon S. Lam and Chen Qian Geographic routing in $d$-dimensional spaces with guaranteed delivery and low stretch . . . . . . . . . . . . . . . . 663--677
De Wen Soh and Wee Peng Tay and Tony Q. S. Quek Randomized information dissemination in dynamic environments . . . . . . . . . . 681--691 Ioannis Pefkianakis and Suk-Bok Lee and Songwu Lu Towards MIMO-aware 802.11n rate adaptation . . . . . . . . . . . . . . . 692--705 Chee Wei Tan and Mung Chiang and R. Srikant Fast algorithms and performance bounds for sum rate maximization in wireless networks . . . . . . . . . . . . . . . . 706--719 Chris Y. T. Ma and David K. Y. Yau and Nung Kwan Yip and Nageswara S. V. Rao Privacy vulnerability of published anonymous mobility traces . . . . . . . 720--733 Hung X. Nguyen and Matthew Roughan Rigorous statistical analysis of Internet loss measurements . . . . . . . 734--745 Dajun Qian and Dong Zheng and Junshan Zhang and Ness B. Shroff and Changhee Joo Distributed CSMA algorithms for link scheduling in multihop MIMO networks under SINR model . . . . . . . . . . . . 746--759 Andréa Richa and Christian Scheideler and Stefan Schmid and Jin Zhang An efficient and fair MAC protocol robust to reactive interference . . . . 760--771 Ji Fang and Kun Tan and Yuanyang Zhang and Shouyuan Chen and Lixin Shi and Jiansong Zhang and Yongguang Zhang and Zhenhui Tan Fine-grained channel access in wireless LAN . . . . . . . . . . . . . . . . . . 772--787 Felipe Lalanne and Stephane Maag A formal data-centric approach for passive testing of communication protocols . . . . . . . . . . . . . . . 788--801 Fabio Checconi and Luigi Rizzo and Paolo Valente QFQ: efficient packet scheduling with tight guarantees . . . . . . . . . . . . 802--816 Tao Li and Shigang Chen and Wen Luo and Ming Zhang and Yan Qiao Spreader classification based on optimal dynamic bit sharing . . . . . . . . . . 817--830 Longbo Huang and Scott Moeller and Michael J. Neely and Bhaskar Krishnamachari LIFO-backpressure achieves near-optimal utility-delay tradeoff . . . . . . . . . 831--844 Natalia Castro Fernandes and Marcelo Duffles Donato Moreira and Otto Carlos Muniz Bandeira Duarte An efficient and robust addressing protocol for node autoconfiguration in ad hoc networks . . . . . . . . . . . . 845--856 Fei Chen and Bezawada Bruhadeshwar and Alex X. Liu Cross-domain privacy-preserving cooperative firewall optimization . . . 857--868 Sriram N. Premnath and Daryl Wasden and Sneha K. Kasera and Neal Patwari and Behrouz Farhang-Boroujeny Beyond OFDM: best-effort dynamic spectrum access using filterbank multicarrier . . . . . . . . . . . . . . 869--882 Manuel Fogue and Piedad Garrido and Francisco J. Martinez and Juan-Carlos Cano and Carlos T. Calafate and Pietro Manzoni An adaptive system based on roadmap profiling to enhance warning message dissemination in VANETs . . . . . . . . 883--895 Mustafa Y. Arslan and Konstantinos Pelechrinis and Ioannis Broustis and Shailendra Singh and Srikanth V. Krishnamurthy and Sateesh Addepalli and Konstantina Papagiannaki ACORN: an auto-configuration framework for 802.11n WLANs . . . . . . . . . . . 896--909 Kai Han and Yang Liu and Jun Luo Duty-cycle-aware minimum-energy multicasting in wireless sensor networks 910--923 Yuanqing Zheng and Mo Li Fast tag searching protocol for large-scale RFID systems . . . . . . . . 924--934 Eitan Altman and Philippe Nain and Adam Shwartz and Yuedong Xu Predicting the impact of measures against P2P networks: transient behavior and phase transition . . . . . . . . . . 935--949 Tae-Suk Kim and Ioannis Broustis and Serdar Vural and Dimitris Syrivelis and Shailendra Singh and Srikanth V. Krishnamurthy and Thomas F. La Porta Realizing the benefits of wireless network coding in multirate settings . . 950--962 Yilin Shen and Nam P. Nguyen and Ying Xuan and My T. Thai On the discovery of critical links and nodes for assessing network vulnerability . . . . . . . . . . . . . 963--973 Reza Moazzez-Estanjini and Jing Wang and Ioannis Ch. Paschalidis Scheduling mobile nodes for cooperative data transport in sensor networks . . . 974--989 Stefano Vissicchio and Laurent Vanbever and Cristel Pelsser and Luca Cittadini and Pierre Francois and Olivier Bonaventure Improving network agility with seamless BGP reconfigurations . . . . . . . . . . 990--1002 Stefano Paris and Cristina Nita-Rotaru and Fabio Martignon and Antonio Capone Cross-layer metrics for reliable routing in wireless mesh networks . . . . . . . 1003--1016
Kaidi D. Huang and Ken R. Duffy and David Malone H-RCA: 802.11 collision-aware rate control . . . . . . . . . . . . . . . . 1021--1034 Sayandeep Sen and Tan Zhang and Syed Gilani and Shreesha Srinath and Suman Banerjee and Sateesh Addepalli Design and implementation of an ``approximate'' communication system for wireless media applications . . . . . . 1035--1048 Rahul Srivastava and Can Emre Koksal Basic performance limits and tradeoffs in energy-harvesting sensor nodes with finite data and energy storage . . . . . 1049--1062 Javad Ghaderi and R. Srikant The impact of access probabilities on the delay performance of Q--CSMA algorithms in wireless networks . . . . 1063--1075 Amir R. Khakpour and Alex X. Liu An information-theoretical approach to high-speed flow nature identification 1076--1089 Xiaoming Wang and Xiaoyong Li and Dmitri Loguinov Modeling residual-geometric flow sampling . . . . . . . . . . . . . . . . 1090--1103 Tsern-Huei Lee and Nai-Lun Huang A pattern-matching scheme with high throughput performance and low memory requirement . . . . . . . . . . . . . . 1104--1116 Longbo Huang and Michael J. Neely Utility optimal scheduling in energy-harvesting networks . . . . . . . 1117--1130 Amin Karbasi and Sewoong Oh Robust localization from incomplete local information . . . . . . . . . . . 1131--1144 David López-Pérez and Xiaoli Chu and Athanasios V. Vasilakos and Holger Claussen On distributed and coordinated resource allocation for interference mitigation in self-organizing LTE networks . . . . 1145--1158 Rik Sarkar and Jie Gao Differential forms for target tracking and aggregate queries in distributed networks . . . . . . . . . . . . . . . . 1159--1172 Zhangyu Guan and Tommaso Melodia and Dongfeng Yuan Jointly optimal rate control and relay selection for cooperative wireless video streaming . . . . . . . . . . . . . . . 1173--1186 Liang Zhang and Shigang Chen and Ying Jian and Yuguang Fang and Zhen Mo Maximizing lifetime vector in wireless sensor networks . . . . . . . . . . . . 1187--1200 Yeim-Kuan Chang and Cheng-Chien Su and Yung-Chieh Lin and Sun-Yuan Hsieh Efficient gray-code-based range encoding schemes for packet classification in TCAM . . . . . . . . . . . . . . . . . . 1201--1214 Xinzhou Wu and Saurabha Tavildar and Sanjay Shakkottai and Tom Richardson and Junyi Li and Rajiv Laroia and Aleksandar Jovicic FlashLinQ: a synchronous distributed scheduler for peer-to-peer ad hoc networks . . . . . . . . . . . . . . . . 1215--1228 Chih-Cheng Hsu and Ming-Shing Kuo and Cheng-Fu Chou and Kate Ching-Ju Lin The elimination of spatial-temporal uncertainty in underwater sensor networks . . . . . . . . . . . . . . . . 1229--1242 Zhenghao Zhang and Steven Bronson and Jin Xie and Wei Hu Employing the one-sender-multiple-receiver technique in wireless LANs . . . . . . . . . . . . 1243--1255 Subhash Lakshminarayana and Atilla Eryilmaz Multirate multicasting with intralayer network coding . . . . . . . . . . . . . 1256--1269 Shouling Ji and Zhipeng Cai Distributed data collection in large-scale asynchronous wireless sensor networks under the generalized physical interference model . . . . . . . . . . . 1270--1283 Yosuke Himura and Kensuke Fukuda and Kenjiro Cho and Pierre Borgnat and Patrice Abry and Hiroshi Esaki Synoptic graphlet: bridging the gap between supervised and unsupervised profiling of host-level network traffic 1284--1297 Ken R. Duffy and Charles Bordenave and Douglas J. Leith Decentralized constraint satisfaction 1298--1308 Jacques Lévy Véhel and Michal Rams Large deviation multifractal analysis of a class of additive processes with correlated nonstationary increments . . 1309--1321 Ioannis Caragiannis and Michele Flammini and Luca Moscardelli An exponential improvement on the MST heuristic for minimum energy broadcasting in ad hoc wireless networks 1322--1331 Laura Galluccio and Giacomo Morabito and Sergio Palazzo GEographic Multicast (GEM) for dense wireless networks: protocol design and performance analysis . . . . . . . . . . 1332--1346
Ehsan Aryafar and Theodoros Salonidis and Jingpu Shi and Edward Knightly Synchronized CSMA contention: model, implementation, and evaluation . . . . . 1349--1362 Marco Cello and Giorgio Gnecco and Mario Marchese and Marcello Sanguineti Optimality conditions for coordinate-convex policies in CAC with nonlinear feasibility boundaries . . . . 1363--1377 Minghong Lin and Adam Wierman and Lachlan L. H. Andrew and Eno Thereska Dynamic right-sizing for power-proportional data centers . . . . 1378--1391 Apoorva Jindal and Konstantinos Psounis On the efficiency of CSMA-CA scheduling in wireless multihop networks . . . . . 1392--1406 Xiaolan Zhang and Giovanni Neglia and Jim Kurose and Don Towsley and Haixiang Wang Benefits of network coding for unicast application in disruption-tolerant networks . . . . . . . . . . . . . . . . 1407--1420 Rubén Cuevas and Michal Kryczka and Angel Cuevas and Sebastian Kaune and Carmen Guerrero and Reza Rejaie Unveiling the incentives for content publishing in popular BitTorrent portals 1421--1435 Sara Gatmir-Motahari and Hui Zang and Phyllis Reuther Time-clustering-based place prediction for wireless subscribers . . . . . . . . 1436--1446 Mustafa Y. Arslan and Jongwon Yoon and Karthikeyan Sundaresan and Srikanth V. Krishnamurthy and Suman Banerjee A resource management system for interference mitigation in enterprise OFDMA femtocells . . . . . . . . . . . . 1447--1460 Reuven Cohen and Ilia Nudelman and Gleb Polevoy On the admission of dependent flows in powerful sensor networks . . . . . . . . 1461--1471 Hazem Gomaa and Geoffrey G. Messier and Carey Williamson and Robert Davies Estimating instantaneous cache hit ratio using Markov chain analysis . . . . . . 1472--1483 Ilario Filippini and Eylem Ekici and Matteo Cesana A new outlook on routing in cognitive radio networks: minimum-maintenance-cost routing . . . . . . . . . . . . . . . . 1484--1498 Wei Wang and Donghyun Kim and Min Kyung An and Wei Gao and Xianyue Li and Zhao Zhang and Weili Wu On construction of quality fault-tolerant virtual backbone in wireless networks . . . . . . . . . . . 1499--1510 Yongjun Liao and Wei Du and Pierre Geurts and Guy Leduc DMFSGD: a decentralized matrix factorization algorithm for network distance prediction . . . . . . . . . . 1511--1524 Pankaj K. Agarwal and Alon Efrat and Shashidhara K. Ganjugunte and David Hay and Swaminathan Sankararaman and Gil Zussman The resilience of WDM networks to probabilistic geographical failures . . 1525--1538 Bo Ji and Changhee Joo and Ness B. Shroff Delay-based back-pressure scheduling in multihop wireless networks . . . . . . . 1539--1552 Albert Banchs and Andres Garcia-Saavedra and Pablo Serrano and Joerg Widmer A game-theoretic approach to distributed opportunistic scheduling . . . . . . . . 1553--1566 Myungjin Lee and Nick Duffield and Ramana Rao Kompella High-fidelity per-flow delay measurements with reference latency interpolation . . . . . . . . . . . . . 1567--1580 Rajasekhar Sappidi and André Girard and Catherine Rosenberg Maximum achievable throughput in a wireless sensor network using in-network computation for statistical functions 1581--1594 Ehsan Aryafar and Mohammad Ali Khojastepour and Karthik Sundaresan and Sampath Rangarajan and Edward Knightly ADAM: an adaptive beamforming system for multicasting in wireless LANs . . . . . 1595--1608 Faryad Darabi Sahneh and Caterina Scoglio and Piet Van Mieghem Generalized epidemic mean-field model for spreading processes over multilayer complex networks . . . . . . . . . . . . 1609--1620 Kyunghan Lee and Yoora Kim and Song Chong and Injong Rhee and Yung Yi and Ness B. Shroff On the critical delays of mobile networks under Lévy walks and Lévy flights 1621--1635 Tae Hyun Kim and Jian Ni and R. Srikant and Nitin H. Vaidya Throughput-optimal CSMA with imperfect carrier sensing . . . . . . . . . . . . 1636--1650 Ramin Khalili and Nicolas Gast and Miroslav Popovic and Jean-Yves Le Boudec MPTCP is not Pareto-optimal: performance issues and a possible solution . . . . . 1651--1665 Ji-Yong Shin and Emin Gn Sirer and Hakim Weatherspoon and Darko Kirovski On the feasibility of completely wireless datacenters . . . . . . . . . . 1666--1679
Horia Vlad Balan and Ryan Rogalin and Antonios Michaloliakos and Konstantinos Psounis and Giuseppe Caire AirSync: enabling distributed multiuser MIMO with full spatial multiplexing . . 1681--1695 Dongyue Xue and Eylem Ekici Delay-guaranteed cross-layer scheduling in multihop wireless networks . . . . . 1696--1707 Mehmet Karaca and Karim Khalil and Eylem Ekici and Ozgur Ercetin Optimal scheduling and power allocation in cooperate-to-join cognitive radio networks . . . . . . . . . . . . . . . . 1708--1721 Liu Xiang and Jun Luo and Catherine Rosenberg Compressed data aggregation: energy-efficient and high-fidelity data collection . . . . . . . . . . . . . . . 1722--1735 Piotr H. Srebrny and Thomas Plagemann and Vera Goebel and Andreas Mauthe No more Déj\`a Vu: eliminating redundancy with cachecast: feasibility and performance gains . . . . . . . . . . . 1736--1749 Enzo Baccarelli and Nicola Cordeschi and Valentina Polli Optimal self-adaptive QoS resource management in interference-affected multicast wireless networks . . . . . . 1750--1759 Derek Leonard and Dmitri Loguinov Demystifying Internet-wide service discovery . . . . . . . . . . . . . . . 1760--1773 Osameh M. Al-Kofahi and Ahmed E. Kamal Scalable redundancy for sensors-to-sink communication . . . . . . . . . . . . . 1774--1784 Carlee Joe-Wong and Soumya Sen and Tian Lan and Mung Chiang Multiresource allocation: fairness-efficiency tradeoffs in a unifying framework . . . . . . . . . . . 1785--1798 Zhijun Li and Guang Gong On the node clone detection in wireless sensor networks . . . . . . . . . . . . 1799--1811 Chandramani Singh and Eitan Altman and Anurag Kumar and Rajesh Sundaresan Optimal forwarding in delay-tolerant networks with multiple destinations . . 1812--1826 Ming Ouyang and Lei Ying Approaching throughput optimality with limited feedback in multichannel wireless downlink networks . . . . . . . 1827--1838 Masaki Fukushima and Kohei Sugiyama and Teruyuki Hasegawa and Toru Hasegawa and Akihiro Nakao Minimum disclosure routing for network virtualization and its experimental evaluation . . . . . . . . . . . . . . . 1839--1851 Nikolaos Laoutaris and Georgios Smaragdakis and Rade Stanojevic and Pablo Rodriguez and Ravi Sundaram Delay-tolerant bulk data transfers on the Internet . . . . . . . . . . . . . . 1852--1865 Richard T. B. Ma and Vishal Misra The public option: a nonregulatory alternative to network neutrality . . . 1866--1879 Yin Wang and Yuan He and Xufei Mao and Yunhao Liu and Xiang-Yang Li Exploiting constructive interference for scalable flooding in wireless networks 1880--1889 Joan Triay and Cristina Cervelló-Pastor and Vinod M. Vokkarane Analytical blocking probability model for hybrid immediate and advance reservations in optical WDM networks . . 1890--1903 Huasen Wu and Chenxi Zhu and Richard J. La and Xin Liu and Youguang Zhang FASA: accelerated S-ALOHA using access history for event-driven M2M communications . . . . . . . . . . . . . 1904--1917 William Wei-Liang Li and Yuan Shen and Ying Jun Zhang and Moe Z. Win Robust power allocation for energy-efficient location-aware networks 1918--1930 Tilman Wolf and Sriram Natarajan and Kamlesh T. Vasudevan High-performance capabilities for $1$-hop containment of network attacks 1931--1946 Dejun Yang and Guoliang Xue and Xi Fang and Satyajayant Misra and Jin Zhang A game-theoretic approach to stable routing in max-min fair networks . . . . 1947--1959 M. Zubair Shafiq and Lusheng Ji and Alex X. Liu and Jeffrey Pang and Jia Wang Large-scale measurement and characterization of cellular machine-to-machine traffic . . . . . . . 1960--1973 Tao Li and Shigang Chen and Yibei Ling Efficient protocols for identifying the missing tags in a large RFID system . . 1974--1987 Guanhong Pei and Srinivasan Parthasarathy and Aravind Srinivasan and Anil Kumar S. Vullikanti Approximation algorithms for throughput maximization in wireless networks with delay constraints . . . . . . . . . . . 1988--2000 S. Shunmuga Krishnan and Ramesh K. Sitaraman Video stream quality impacts viewer behavior: inferring causality using quasi-experimental designs . . . . . . . 2001--2014
Shan-Hung Wu and Ming-Syan Chen and Chung-Min Chen Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System . . . . . . . . . . 1--15 Junbeom Hur and Kyungtae Kang Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 16--26 Jian Tan and Swapna and Shroff Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail . . . . . . . . . . . . . . . . . . 27--38 Eyal Zohar and Israel Cidon and Osnat Mokryn PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System . . . . . . . 39--51 Yan Cai and Xiaolin Wang and Weibo Gong and Don Towsley A Study on the Performance of a Three-Stage Load-Balancing Switch . . . 52--65 Jinbei Zhang and Luoyi Fu and Xinbing Wang Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks . . . . 66--79 Md. Forkan Uddin and Catherine Rosenberg and Weihua Zhuang and Patrick Mitran and Andre Girard Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks . . . . . . . . . . . . . . . . 80--93 Chad R. Meiners and Jignesh Patel and Eric Norige and Alex X. Liu and Eric Torng Fast Regular Expression Matching Using Small TCAM . . . . . . . . . . . . . . . 94--109 Raffaele Bolla and Roberto Bruschi and Alessandro Carrega and Franco Davoli Green Networking With Packet Processing Engines: Modeling and Optimization . . . 110--123 Wei Ren and Qing Zhao and Ananthram Swami Temporal Traffic Dynamics Improve the Connectivity of Ad Hoc Cognitive Radio Networks . . . . . . . . . . . . . . . . 124--136 Supratim Deb and Pantelis Monogioudis and Jerzy Miernik and James P. Seymour Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE HetNets . . . . . . . . . . . . . . . . 137--150 Srikanth Hariharan and Ness B. Shroff On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Forests . . . . . . . . . . . . . . . . 151--164 Marcin Bienkowski and Anja Feldmann and Johannes Grassler and Gregor Schaffrath and Stefan Schmid The Wide-Area Virtual Service Migration Problem: a Competitive Analysis Approach 165--178 Onur Turkcu and Suresh Subramaniam Optimal Wavebanding in WDM Ring Networks 179--190 Wei Li and Shengling Wang and Yong Cui and Xiuzhen Cheng and Ran Xin and Mznah A. Al-Rodhaan and Abdullah Al-Dhelaan AP Association for Proportional Fairness in Multirate WLANs . . . . . . . . . . . 191--202 Leonardo Goratti and Ece Yaprak and Stefano Savazzi and Carlos Pomalaza-Raez An Urn Occupancy Approach for Modeling the Energy Consumption of Distributed Beaconing . . . . . . . . . . . . . . . 203--216 Vinod Ramaswamy and Vinith Reddy and Srinivas Shakkottai and Alex Sprintson and Natarajan Gautam Multipath Wireless Network Coding: an Augmented Potential Game Perspective . . 217--229 Christian Esposito and Marco Platania and Roberto Beraldi Reliable and Timely Event Notification for Publish/Subscribe Services Over the Internet . . . . . . . . . . . . . . . . 230--243 Nazanin Magharei and Reza Rejaie and Ivica Rimac and Volker Hilt and Markus Hofmann ISP-Friendly Live P2P Streaming . . . . 244--256 Mihalis G. Markakis and Eytan Modiano and John N. Tsitsiklis Max-Weight Scheduling in Queueing Networks With Heavy-Tailed Traffic . . . 257--270 Eric Anderson and Caleb Phillips and Douglas Sicker and Dirk Grunwald Optimization Decomposition for Scheduling and System Configuration in Wireless Networks . . . . . . . . . . . 271--284 Shurui Huang and Aditya Ramamoorthy On the Multiple-Unicast Capacity of $3$-Source, $3$-Terminal Directed Acyclic Networks . . . . . . . . . . . . 285--299 Francois Clad and Pascal Merindol and Jean-Jacques Pansiot and Pierre Francois and Olivier Bonaventure Graceful Convergence in Link-State IP Networks: a Lightweight Algorithm Ensuring Minimal Operational Impact . . 300--312 Bernardetta Addis and Antonio Capone and Giuliana Carello and Luca G. Gianoli and Brunilde Sanso Energy Management Through Optimized Routing and Device Powering for Greener Communication Networks . . . . . . . . . 313--325 Junchen Jiang and Vyas Sekar and Hui Zhang Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive . . . . . . . . . 326--340
Andrés Ferragut and Fernando Paganini Network resource allocation for users with multiple connections: fairness and stability . . . . . . . . . . . . . . . 349--362 Rafael Laufer and Theodoros Salonidis and Henrik Lundgren and Pascal Le Guyadec A cross-layer backpressure architecture for wireless multihop networks . . . . . 363--376 Faisal Khan and Nicholas Hosein and Soheil Ghiasi and Chen-Nee Chuah and Puneet Sharma Streaming solutions for fine-grained network traffic measurements and analysis . . . . . . . . . . . . . . . . 377--390 Nejc Skoberne and Olaf Maennel and Iain Phillips and Randy Bush and Jan Zorz and Mojca Ciglaric IPv4 address sharing mechanism classification and tradeoff analysis . . 391--404 Amir Nahir and Ariel Orda and Ari Freund Topology design of communication networks: a game-theoretic perspective 405--414 Anat Bremler-Barr and David Hay and Yaron Koral CompactDFA: Scalable pattern matching using longest prefix match solutions . . 415--428 Mohit Chamania and Admela Jukan A comparative analysis of the effects of dynamic optical circuit provisioning on IP routing . . . . . . . . . . . . . . . 429--442 Hyesook Lim and Nara Lee and Geumdan Jin and Jungwon Lee and Youngju Choi and Changhoon Yim Boundary cutting for packet classification . . . . . . . . . . . . . 443--456 Vinod Ramaswamy and Diganto Choudhury and Srinivas Shakkottai Which protocol? Mutual interaction of heterogeneous congestion controllers . . 457--469 Guoliang Xue and Ravi Gottapu and Xi Fang and Dejun Yang and Krishnaiyan Thulasiraman A polynomial-time algorithm for computing disjoint lightpath pairs in minimum isolated-failure-immune WDM optical networks . . . . . . . . . . . . 470--483 Ralf Lübben and Markus Fidler and Jörg Liebeherr Stochastic bandwidth estimation in networks with random service . . . . . . 484--497 Kai Chen and Ankit Singla and Atul Singh and Kishore Ramachandran and Lei Xu and Yueping Zhang and Xitao Wen and Yan Chen OSA: an optical switching architecture for data center networks with unprecedented flexibility . . . . . . . 498--511 Vojislav Gaji\'c and Jianwei Huang and Bixio Rimoldi Competition of wireless providers for atomic users . . . . . . . . . . . . . . 512--525 Luca De Cicco and Saverio Mascolo An adaptive video streaming control system: modeling, validation, and performance evaluation . . . . . . . . . 526--539 Franck Le and João Luís Sobrinho Interconnecting routing instances . . . 540--553 Hongyi Zeng and Peyman Kazemian and George Varghese and Nick McKeown Automatic test packet generation . . . . 554--566 Feng Li and Chi Zhang and Jun Luo and Shi-Qing Xin and Ying He LBDP: localized boundary detection and parametrization for $3$-D sensor networks . . . . . . . . . . . . . . . . 567--579 Veeraruna Kavitha and Eitan Altman and R. El-Azouzi and Rajesh Sundaresan Fair scheduling in cellular systems in the presence of noncooperative mobiles 580--594 Elliot Anshelevich and Bugra Caskurlu and Koushik Kar and Hang Zhang Capacity allocation games for network-coded multicast streaming . . . 595--607 Qingjun Xiao and Bin Xiao and Kai Bu and Jiannong Cao Iterative localization of wireless sensor networks: an accurate and robust approach . . . . . . . . . . . . . . . . 608--621 Yixuan Li and Qiuyu Peng and Xinbing Wang Multicast capacity with max-min fairness for heterogeneous networks . . . . . . . 622--635 Rami Cohen and Danny Raz Cost-effective resource allocation of overlay routing relay nodes . . . . . . 636--646 Patrick Loiseau and Galina Schwartz and John Musacchio and Saurabh Amin and S. Shankar Sastry Incentive mechanisms for Internet congestion management: fixed-budget rebate versus time-of-day pricing . . . 647--661 Changhee Joo and Ness B. Shroff On the delay performance of in-network aggregation in lossy wireless sensor networks . . . . . . . . . . . . . . . . 662--673 Sem C. Borst and Mihalis G. Markakis and Iraj Saniee Nonconcave utility maximization in locally coupled systems, with applications to wireless and wireline networks . . . . . . . . . . . . . . . . 674--687
Mukundan Venkataraman and Mainak Chatterjee Effects of Internet path selection on video-QoE: analysis and improvements . . 689--702 Shuqin Li and Jianwei Huang Price differentiation for communication networks . . . . . . . . . . . . . . . . 703--716 Shaoquan Zhang and Ziyu Shao and Minghua Chen and Libin Jiang Optimal distributed P2P streaming under node degree bounds . . . . . . . . . . . 717--730 Jeong-Woo Cho and Yung Yi On the payoff mechanisms in peer-assisted services with multiple content providers: rationality and fairness . . . . . . . . . . . . . . . . 731--744 Olga Goussevskaia and Magnús M. Halldórsson and Roger Wattenhofer Algorithms for wireless capacity . . . . 745--755 Karthikeyan Sundaresan and Sampath Rangarajan Cooperation versus multiplexing: multicast scheduling algorithms for OFDMA relay networks . . . . . . . . . . 756--769 Hisham M. Almasaeid and Ahmed E. Kamal Exploiting multichannel diversity for cooperative multicast in cognitive radio mesh networks . . . . . . . . . . . . . 770--783 Dulanjalie C. Dhanapala and Anura P. Jayasumana Topology preserving maps: extracting layout maps of wireless sensor networks from virtual coordinates . . . . . . . . 784--797 Jeff Seibert and Sheila Becker and Cristina Nita-Rotaru and Radu State Newton: securing virtual coordinates by enforcing physical laws . . . . . . . . 798--811 Ning Lu and Tom H. Luan and Miao Wang and Xuemin Shen and Fan Bai Bounds of asymptotic performance limits of social-proximity vehicular networks 812--825 Yang Xu and Chenguang Yu and Jingjiang Li and Yong Liu Video telephony for end-consumers: measurement study of Google+, iChat and Skype . . . . . . . . . . . . . . . . . 826--839 Chaitanya S. K. Vadrevu and Rui Wang and Massimo Tornatore and Charles U. Martel and Biswanath Mukherjee Degraded service provisioning in mixed-line-rate WDM backbone networks using multipath routing . . . . . . . . 840--849 Ahmad R. Dhaini and Pin-Han Ho and Gangxiang Shen and Basem Shihada Energy efficiency in TDMA-based next-generation passive optical access networks . . . . . . . . . . . . . . . . 850--863 Navid Abedini and Srinivas Shakkottai Content caching and scheduling in wireless networks with elastic and inelastic traffic . . . . . . . . . . . 864--874 Addisu Tadesse Eshete and Yuming Jiang On the transient behavior of CHOKe . . . 875--888 Yifan Zhang and Gexin Yu and Qun Li and Haodong Wang and Xiaojun Zhu and Baosheng Wang Channel-hopping-based communication rendezvous in cognitive radio networks 889--902 Hui Lin and Halit Üster Exact and heuristic algorithms for data-gathering cluster-based wireless sensor network design problem . . . . . 903--916 Georgios Smaragdakis and Nikolaos Laoutaris and Konstantinos Oikonomou and Ioannis Stavrakakis and Azer Bestavros Distributed server migration for scalable Internet service deployment . . 917--930 Kuai Xu and Feng Wang and Lin Gu Behavior analysis of Internet traffic via bipartite graphs and one-mode projections . . . . . . . . . . . . . . 931--942 Michael Butkiewicz and Harsha V. Madhyastha and Vyas Sekar Characterizing Web page complexity and its impact . . . . . . . . . . . . . . . 943--956 Layong Luo and Gaogang Xie and Yingke Xie and Laurent Mathy and Kavé Salamatian A hybrid hardware architecture for high-speed IP lookups and fast route updates . . . . . . . . . . . . . . . . 957--969 Chengchen Hu and Bin Liu and Hongbo Zhao and Kai Chen and Yan Chen and Yu Cheng and Hao Wu Discount counting for fast flow statistics on flow size and flow volume 970--981 Yang Xu and Zhaobo Liu and Zhuoyuan Zhang and H. Jonathan Chao High-throughput and memory-efficient multimatch packet classification based on distributed and pipelined hash tables 982--995 Wouter Minnebo and Benny Van Houdt A fair comparison of pull and push strategies in large distributed networks 996--1006 Paul T. Congdon and Prasant Mohapatra and Matthew Farrens and Venkatesh Akella Simultaneously reducing latency and power consumption in OpenFlow switches 1007--1020
Ítalo Cunha and Renata Teixeira and Darryl Veitch and Christophe Diot DTRACK: a system to predict and track Internet path changes . . . . . . . . . 1025--1038 Andrés Altieri and Leonardo Rey Vega and Pablo Piantanida and Cecilia G. Galarza Analysis of a cooperative strategy for a large decentralized wireless network . . 1039--1051 Hyang-Won Lee and Kayi Lee and Eytan Modiano Maximizing reliability in WDM networks through lightpath routing . . . . . . . 1052--1066 János Tapolcai and Pin-Han Ho and Péter Babarczi and Lajos Rónyai On signaling-free failure dependent restoration in all-optical mesh networks 1067--1078 Wen Luo and Shigang Chen and Yan Qiao and Tao Li Missing-tag detection and energy-time tradeoff in large-scale RFID systems with unreliable channels . . . . . . . . 1079--1091 Ori Rottenstreich and Yossi Kanizo and Isaac Keslassy The variable-increment counting Bloom filter . . . . . . . . . . . . . . . . . 1092--1105 Yishuai Chen and Baoxian Zhang and Changjia Chen and Dah Ming Chiu Performance modeling and evaluation of peer-to-peer live streaming systems under flash crowds . . . . . . . . . . . 1106--1120 Hamed Mohsenian-Rad and Jianwei Huang and Vincent W. S. Wong and Robert Schober Repeated intersession network coding games: efficiency and min-max bargaining solution . . . . . . . . . . . . . . . . 1121--1135 Myungjin Lee and Sharon Goldberg and Ramana Rao Kompella and George Varghese FineComb: measuring microscopic latency and loss in the presence of reordering 1136--1149 Shizhen Zhao and Xinbing Wang Node density and delay in large-scale wireless networks with unreliable links 1150--1163 Hao Yue and Chi Zhang and Miao Pan and Yuguang Fang and Shigang Chen Unknown-target information collection in sensor-enabled RFID systems . . . . . . 1164--1175 Frank Aurzada and Martin Lévesque and Martin Maier and Martin Reisslein FiWi access networks based on next-generation PON and gigabit-class WLAN technologies: a capacity and delay analysis . . . . . . . . . . . . . . . . 1176--1189 Shang-Pin Sheng and Mingyan Liu Profit incentive in trading nonexclusive access on a secondary spectrum market through contract design . . . . . . . . 1190--1203 Jin-Ghoo Choi and Changhee Joo and Junshan Zhang and Ness B. Shroff Distributed link scheduling under SINR model in multihop wireless networks . . 1204--1217 Xin Zhang and Fanfu Zhou and Xinyu Zhu and Haiyang Sun and Adrian Perrig and Athanasios V. Vasilakos and Haibing Guan DFL: secure and practical fault localization for datacenter networks . . 1218--1231 Amir Houmansadr and Negar Kiyavash and Nikita Borisov Non-blind watermarking of network flows 1232--1244 Shuang Li and Zizhan Zheng and Eylem Ekici and Ness Shroff Maximizing system throughput by cooperative sensing in cognitive radio networks . . . . . . . . . . . . . . . . 1245--1256 Zvi Rosberg and Yu Peng and Jing Fu and Jun Guo and Eric W. M. Wong and Moshe Zukerman Insensitive job assignment with throughput and energy criteria for processor-sharing server farms . . . . . 1257--1270 Wei Dong and Swati Rallapalli and Rittwik Jana and Lili Qiu and K. K. Ramakrishnan and Leo Razoumov and Yin Zhang and Tae Won Cho iDEAL: incentivized dynamic cellular offloading via auctions . . . . . . . . 1271--1284 Jin Teng and Boying Zhang and Junda Zhu and Xinfeng Li and Dong Xuan and Yuan F. Zheng EV-Loc: integrating electronic and visual signals for accurate localization 1285--1296 Hulya Seferoglu and Athina Markopoulou Network coding-aware queue management for TCP flows over coded wireless networks . . . . . . . . . . . . . . . . 1297--1310 Peng Yang and Juan Shao and Wen Luo and Lisong Xu and Jitender Deogun and Ying Lu TCP congestion avoidance algorithm identification . . . . . . . . . . . . . 1311--1324 Shengbo Chen and Prasun Sinha and Ness B. Shroff and Changhee Joo A simple asymptotically optimal joint energy allocation and routing scheme in rechargeable sensor networks . . . . . . 1325--1336 Yuan Shen and Wenhan Dai and Moe Z. Win Power optimization for network localization . . . . . . . . . . . . . . 1337--1350 Liang Ma and Ting He and Kin K. Leung and Ananthram Swami and Don Towsley Inferring link metrics from end-to-end path measurements: identifiability and monitor placement . . . . . . . . . . . 1351--1368
Abishek Gopalan and Srinivasan Ramasubramanian On the maximum number of linearly independent cycles and paths in a network . . . . . . . . . . . . . . . . 1373--1388 Bo Han and Jian Li and Aravind Srinivasan Your friends have more friends than you do: identifying influential mobile users through random-walk sampling . . . . . . 1389--1400 Chao-Chih Chen and Lihua Yuan and Albert Greenberg and Chen-Nee Chuah and Prasant Mohapatra Routing-as-a-service (RaaS): a framework for tenant-directed route control in data center . . . . . . . . . . . . . . 1401--1414 Ignacio Castro and Rade Stanojevic and Sergey Gorinsky Using tuangou to reduce IP transit costs 1415--1428 P. M. Van De Ven and Augustus J. E. M. Janssen and J. S. H. Van Leeuwaarden Balancing exposed and hidden nodes in linear wireless networks . . . . . . . . 1429--1443 Hasti Ahlehagh and Sujit Dey Video-aware scheduling and caching in the radio access network . . . . . . . . 1444--1462 Markku Antikainen and Tuomas Aura and Mikko Särelä Denial-of-service attacks in Bloom-filter-based forwarding . . . . . 1463--1476 Shihuan Liu and Eylem Ekici and Lei Ying Scheduling in multihop wireless networks without back-pressure . . . . . . . . . 1477--1488 Jin Xiao and Raouf Boutaba Reconciling the overlay and underlay tussle . . . . . . . . . . . . . . . . . 1489--1502 Dan Li and Hongze Zhao and Mingwei Xu and Xiaoming Fu Revisiting the design of mega data centers: considering heterogeneity among containers . . . . . . . . . . . . . . . 1503--1515 Vinod Muthusamy and Hans-Arno Jacobsen Infrastructure-free content-based publish/subscribe . . . . . . . . . . . 1516--1530 Jongwon Yoon and Honghai Zhang and Suman Banerjee and Sampath Rangarajan Video multicast with joint resource allocation and adaptive modulation and coding in 4G networks . . . . . . . . . 1531--1544 Kang Chen and Haiying Shen SMART: utilizing distributed social map for lightweight routing in delay-tolerant networks . . . . . . . . 1545--1558 Van Minh Nguyen and Chung Shue Chen and Laurent Thomas A unified stochastic model of handover measurement in mobile networks . . . . . 1559--1576 Stepan Kucera Enabling co-channel small-cell deployments in SINR-constraint networks by distributed monitoring of normalized network capacity . . . . . . . . . . . . 1577--1590 Chris Develder and Jens Buysse and Bart Dhoedt and Brigitte Jaumard Joint dimensioning of server and network infrastructure for resilient optical grids/clouds . . . . . . . . . . . . . . 1591--1606 Sen Su and Zhongbao Zhang and Alex X. Liu and Xiang Cheng and Yiwen Wang and Xinchao Zhao Energy-aware virtual network embedding 1607--1620 Rahul Vaze and Rachit Garg and Neetish Pathak Dynamic power allocation for maximizing throughput in energy-harvesting communication system . . . . . . . . . . 1621--1630 I-Hong Hou Scheduling heterogeneous real-time traffic over fading wireless channels 1631--1644 Claudio Cicconetti and Luciano Lenzini and Andrea Lodi and Silvano Martello and Enzo Mingozzi and Michele Monaci Efficient two-dimensional data allocation in IEEE 802.16 OFDMA . . . . 1645--1658 Lei Zhang and Dongning Guo Virtual full duplex wireless broadcasting via compressed sensing . . 1659--1671 Hao Han and Yunxin Liu and Guobin Shen and Yongguang Zhang and Qun Li and Chiu C. Tan Design, realization, and evaluation of DozyAP for power-efficient Wi-Fi tethering . . . . . . . . . . . . . . . 1672--1685 Soroush Jahromizadeh and Veselin Rakocevic Joint rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks 1686--1698
Jignesh Patel and Alex X. Liu and Eric Torng Bypassing space explosion in high-speed regular expression matching . . . . . . 1701--1714 Amy Fu and Parastoo Sadeghi and Muriel Médard Dynamic rate adaptation for improved throughput and delay in wireless network coded broadcast . . . . . . . . . . . . 1715--1728 Cristiano Tapparello and Osvaldo Simeone and Michele Rossi Dynamic compression-transmission for energy-harvesting multihop networks with correlated sources . . . . . . . . . . . 1729--1741 Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha LASTor: a low-latency AS-aware Tor client . . . . . . . . . . . . . . . . . 1742--1755 Sastry Kompella and Gam D. Nguyen and Clement Kam and Jeffrey E. Wieselthier and Anthony Ephremides Cooperation in cognitive underlay networks: stable throughput tradeoffs 1756--1768 Chiara Orsini and Enrico Gregori and Luciano Lenzini and Dmitri Krioukov Evolution of the Internet $k$-dense structure . . . . . . . . . . . . . . . 1769--1780 Shannon Chen and Cing-Yu Chu and Su-Ling Yeh and Hao-Hua Chu and Polly Huang Modeling the QoE of rate changes in Skype/SILK VoIP calls . . . . . . . . . 1781--1793 Kostas Stamatiou and Martin Haenggi Delay characterization of multihop transmission in a Poisson field of interference . . . . . . . . . . . . . . 1794--1807 Somayeh Sojoudi and Steven H. Low and John C. Doyle Buffering dynamics and stability of Internet congestion controllers . . . . 1808--1818 I-Hong Hou and Piyush Gupta Proportionally fair distributed resource allocation in multiband wireless systems 1819--1830 Douglas M. Blough and Paolo Santi and Ramya Srinivasan On the feasibility of unilateral interference cancellation in MIMO networks . . . . . . . . . . . . . . . . 1831--1844 Eugenio Magistretti and Omer Gurewitz and Edward W. Knightly 802.11ec: collision avoidance without control messages . . . . . . . . . . . . 1845--1858 Sungsu Lim and Kyomin Jung and Matthew Andrews Stability of the max-weight protocol in adversarial wireless networks . . . . . 1859--1872 Mahmoud Al-Ayyoub and Himanshu Gupta Truthful spectrum auctions with approximate social-welfare or revenue 1873--1885 Yuanqing Zheng and Mo Li Towards more efficient cardinality estimation for large-scale RFID systems 1886--1896 Changbin Liu and Ricardo Correa and Harjot Gill and Tanveer Gill and Xiaozhou Li and Shivkumar Muthukumar and Taher Saeed and Boon Thau Loo and Prithwish Basu PUMA: policy-based unified multiradio architecture for agile mesh networking 1897--1910 Bo Ji and Gagan R. Gupta and Xiaojun Lin and Ness B. Shroff Low-complexity scheduling policies for achieving throughput and asymptotic delay optimality in multichannel wireless networks . . . . . . . . . . . 1911--1924 Qi Li and Mingwei Xu and Yuan Yang and Lixin Gao and Yong Cui and Jianping Wu Safe and practical energy-efficient detour routing in IP networks . . . . . 1925--1937 Siva Theja Maguluri and R. Srikant Scheduling jobs with unknown duration in clouds . . . . . . . . . . . . . . . . . 1938--1951 Wei Dong and Yunhao Liu and Yuan He and Tong Zhu and Chun Chen Measurement and analysis on the packet delivery performance in a large-scale sensor network . . . . . . . . . . . . . 1952--1963 Alberto Dainotti and Claudio Squarcella and Emile Aben and Kimberly C. Claffy and Marco Chiesa and Michele Russo and Antonio Pescapé Analysis of country-wide Internet outages caused by censorship . . . . . . 1964--1977 Hongyi Yao and Danilo Silva and Sidharth Jaggi and Michael Langberg Network codes resilient to jamming and eavesdropping . . . . . . . . . . . . . 1978--1987 Shaxun Chen and Kai Zeng and Prasant Mohapatra Efficient data capturing for network forensics in cognitive radio networks 1988--2000 Thang N. Dinh and Huiyuan Zhang and Dzung T. Nguyen and My T. Thai Cost-effective viral marketing for time-critical campaigns in large-scale social networks . . . . . . . . . . . . 2001--2011 Guanfeng Liang and Ulas C. Kozat Fast cloud: pushing the envelope on delay performance of cloud storage with coding . . . . . . . . . . . . . . . . . 2012--2025 Maximilian Kriegleder A correction to algorithm A2 in ``Asynchronous distributed averaging on communication networks'' . . . . . . . . 2026--2027
Wanchun Jiang and Fengyuan Ren and Chuang Lin Phase plane analysis of quantized congestion notification for data center Ethernet . . . . . . . . . . . . . . . . 1--14 Hongbo Jiang and Tianlong Yu and Chen Tian and Guang Tan and Chonggang Wang Connectivity-based segmentation in large-scale $2$-D/$3$-D sensor networks: algorithm and applications . . . . . . . 15--27 Cataldo Basile and Antonio Lioy Analysis of application-layer filtering policies with application to HTTP . . . 28--41 Marco Leogrande and Fulvio Risso and Luigi Ciminiera Modeling complex packet filters with finite state automata . . . . . . . . . 42--55 Alberto Rabbachin and Andrea Conti and Moe Z. Win Wireless network intrinsic secrecy . . . 56--69 Haiying Shen and Ze Li A hierarchical account-aided reputation management system for MANETs . . . . . . 70--84 Richard T. B. Ma and John C. S. Lui and Vishal Misra Evolution of the Internet economic ecosystem . . . . . . . . . . . . . . . 85--98 Güner D. Çelik and Eytan Modiano Scheduling in networks with time-varying channels and reconfiguration delay . . . 99--113 Reuven Cohen and Guy Grebla Joint scheduling and fast cell selection in OFDMA wireless networks . . . . . . . 114--125 Yang Yang and Ness B. Shroff Throughput of rateless codes over broadcast erasure channels . . . . . . . 126--137 Gabi Nakibly and Reuven Cohen and Liran Katzir Optimizing data plane resources for multipath flows . . . . . . . . . . . . 138--147 Alessandro Checco and Douglas J. Leith Fair virtualization of 802.11 networks 148--160 Fabio Martignon and Stefano Paris and Ilario Filippini and Lin Chen and Antonio Capone Efficient and truthful bandwidth allocation in wireless mesh community networks . . . . . . . . . . . . . . . . 161--174 Bahar Partov and Douglas J. Leith and Rouzbeh Razavi Utility fair optimization of antenna tilt angles in LTE networks . . . . . . 175--185 Jiliang Wang and Wei Dong and Zhichao Cao and Yunhao Liu On the delay performance in a large-scale wireless sensor network: measurement, analysis, and implications 186--197 Fragkiskos Papadopoulos and Constantinos Psomas and Dmitri Krioukov Network mapping by replaying hyperbolic growth . . . . . . . . . . . . . . . . . 198--211 Kang Chen and Haiying Shen DTN-FLOW: inter-landmark data flow for high-throughput routing in DTNs . . . . 212--226 Stefano Vissicchio and Luca Cittadini and Giuseppe Di Battista On iBGP routing policies . . . . . . . . 227--240 Muhammad Shahzad and Alex X. Liu Fast and accurate estimation of RFID tags . . . . . . . . . . . . . . . . . . 241--254 Yuan-Cheng Lai and Ling-Yen Hsiao and Bor-Shen Lin Optimal slot assignment for binary tracking tree protocol in RFID tag identification . . . . . . . . . . . . . 255--268 Karumbu Premkumar and Xiaomin Chen and Douglas J. Leith Proportional fair coding for wireless mesh networks . . . . . . . . . . . . . 269--281 P. Brighten Godfrey and Matthew Caesar and Ian Haken and Yaron Singer and Scott Shenker and Ion Stoica Stabilizing route selection in BGP . . . 282--299 Xinghua Sun and Lin Dai Backoff design for IEEE 802.11 DCF networks: fundamental tradeoff and design criterion . . . . . . . . . . . . 300--316 Didem Gözüpek and Mordechai Shalom and Fatih Alagöz A graph-theoretic approach to scheduling in cognitive radio networks . . . . . . 317--328
Alberto Dainotti and Alistair King and Kimberly Claffy and Ferdinando Papale and Antonio Pescapé Analysis of a ``/0'' stealth scan from a botnet . . . . . . . . . . . . . . . . . 341--354 Carlee Joe-Wong and Soumya Sen and Sangtae Ha Offering supplementary network technologies: adoption behavior and offloading benefits . . . . . . . . . . 355--368 Lieven Tytgat and Opher Yaron and Sofie Pollin and Ingrid Moerman and Piet Demeester Analysis and experimental verification of frequency-based interference avoidance mechanisms in IEEE 802.15.4 369--382 Mukundan Madhavan and Harish Ganapathy and Malolan Chetlur and Shivkumar Kalyanaraman Adapting cellular networks to whitespaces spectrum . . . . . . . . . . 383--397 Supratim Deb and Pantelis Monogioudis Learning-based uplink interference management in $4$G LTE cellular systems 398--411 George Papageorgiou and Shailendra Singh and Srikanth V. Krishnamurthy and Ramesh Govindan and Tom La Porta A distortion-resistant routing framework for video traffic in wireless multihop networks . . . . . . . . . . . . . . . . 412--425 Reuven Cohen and Guy Grebla Efficient allocation of periodic feedback channels in broadband wireless networks . . . . . . . . . . . . . . . . 426--436 Liguang Xie and Yi Shi and Y. Thomas Hou and Wenjing Lou and Hanif D. Sherali and Scott F. Midkiff Multi-node wireless energy charging in sensor networks . . . . . . . . . . . . 437--450 Chih-Chuan Cheng and Pi-Cheng Hsiu Extend your journey: considering signal strength and fluctuation in location-based applications . . . . . . 451--464 Yong Cui and Lian Wang and Xin Wang and Hongyi Wang and Yining Wang FMTCP: a fountain code-based multipath transmission control protocol . . . . . 465--478 Sanaz Barghi and Hamid Jafarkhani Exploiting asynchronous amplify-and-forward relays to enhance the performance of IEEE 802.11 networks 479--490 Tong Ye and Tony T. Lee and Weisheng Hu AWG-based non-blocking Clos networks . . 491--504 Po-Kai Huang and Xiaojun Lin Achieving optimal throughput utility and low delay with CSMA-like algorithms: a virtual multichannel approach . . . . . 505--518 Dongyue Xue and Robert Murawski and Eylem Ekici Capacity achieving distributed scheduling with finite buffers . . . . . 519--532 Tung-Wei Kuo and Kate Ching-Ju Lin and Ming-Jer Tsai Maximizing submodular set function with connectivity constraint: theory and application to networks . . . . . . . . 533--546 Lorenzo Rossi and Jacob Chakareski and Pascal Frossard and Stefania Colonnese A Poisson hidden Markov model for multiview video traffic . . . . . . . . 547--558 Armin Banaei and Daren B. H. Cline and Costas N. Georghiades and Shuguang Cui On asymptotic statistics for geometric routing schemes in wireless ad hoc networks . . . . . . . . . . . . . . . . 559--573 Sucha Supittayapornpong and Michael J. Neely Quality of information maximization for wireless networks via a fully separable quadratic policy . . . . . . . . . . . . 574--586 Andreea Picu and Thrasyvoulos Spyropoulos DTN-meteo: forecasting the performance of DTN protocols under heterogeneous mobility . . . . . . . . . . . . . . . . 587--602 Zhenyu Wu and Zhang Xu and Haining Wang Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud . . . . 603--614 Chih-Ping Li and Eytan Modiano Receiver-based flow control for networks in overload . . . . . . . . . . . . . . 616--630 Bin Li and Ruogu Li and Atilla Eryilmaz On the optimal convergence speed of wireless scheduling for fair resource allocation . . . . . . . . . . . . . . . 631--643 Qiang Liu and Xin Wang and Nageswara S. V. Rao Fusion of state estimates over long-haul sensor networks with random loss and delay . . . . . . . . . . . . . . . . . 644--656 Zhenhua Liu and Minghong Lin and Adam Wierman and Steven Low and Lachlan L. H. Andrew Greening geographical load balancing . . 657--671 Daniele Riboni and Antonio Villani and Domenico Vitali and Claudio Bettini and Luigi V. Mancini Obfuscation of sensitive data for incremental release of network flows . . 672--686
Yu Wu and Chuan Wu and Bo Li and Linquan Zhang and Zongpeng Li and Francis C. M. Lau Scaling social media applications into geo-distributed clouds . . . . . . . . . 689--702 Ori Rottenstreich and Isaac Keslassy The Bloom paradox: when not to use a Bloom filter . . . . . . . . . . . . . . 703--716 Christoph Lenzen and Philipp Sommer and Roger Wattenhofer PulseSync: an efficient and scalable clock synchronization protocol . . . . . 717--727 I-Hong Hou Broadcasting delay-constrained traffic over unreliable wireless links with network coding . . . . . . . . . . . . . 728--740 Stefano Traverso and Luca Abeni and Robert Birke and Csaba Kiraly and Emilio Leonardi and Renato Lo Cigno and Marco Mellia Neighborhood filtering strategies for overlay construction in P2P-TV systems: design and experimental comparison . . . 741--754 Zhongmei Yao and Daren B. H. Cline and Dmitri Loguinov Unstructured P2P link lifetimes redux 755--767 Zizhan Zheng and Zhixue Lu and Prasun Sinha and Santosh Kumar Ensuring predictable contact opportunity for scalable vehicular Internet access on the go . . . . . . . . . . . . . . . 768--781 Jihwan Kim and Hyang-Won Lee and Song Chong CSMA-based robust AP throughput guarantee under user distribution uncertainty . . . . . . . . . . . . . . 782--795 Muhammad Shahzad and Alex X. Liu Probabilistic optimal tree hopping for RFID identification . . . . . . . . . . 796--809 Yanjun Yao and Qing Cao and Athanasios V. Vasilakos EDAL: an energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks . . . . . . . . . . . . 810--823 Xia Zhou and Zengbin Zhang and Gang Wang and Xiaoxiao Yu and Ben Y. Zhao and Haitao Zheng Practical conflict graphs in the wild 824--835 George Athanasiou and Pradeep Chathuranga Weeraddana and Carlo Fischione and Leandros Tassiulas Optimizing client association for load balancing and fairness in millimeter-wave wireless networks . . . 836--850 Corentin Briat and Emre Altug Yavuz and Håkan Hjalmarsson and Karl Henrik Johansson and Ulf T. Jönsson and Gunnar Karlsson and Henrik Sandberg The conservation of information, towards an axiomatized modular modeling approach to congestion control . . . . . . . . . 851--865 Maricica Nistor and Daniel E. Lucani and João Barros Hardware abstraction and protocol optimization for coded sensor networks 866--879 Bo Ji and Gagan R. Gupta and Manu Sharma and Xiaojun Lin and Ness B. Shroff Achieving optimal throughput and near-optimal asymptotic delay performance in multichannel wireless networks with low complexity: a practical greedy scheduling policy . . . 880--893 Hu Jin and Bang Chul Jung and Victor C. M. Leung Fundamental limits of CDF-based scheduling: throughput, fairness, and feedback overhead . . . . . . . . . . . 894--907 Stojan Trajanovski and Fernando A. Kuipers and Aleksandar Ili\'c and Jon Crowcroft and Piet Van Mieghem Finding critical regions and region-disjoint paths in a network . . . 908--921 Zhichao Cao and Yuan He and Qiang Ma and Yunhao Liu $ L^2 $: lazy forwarding in low-duty-cycle wireless sensor network 922--930 Leonidas Georgiadis and Georgios S. Paschos and Lavy Libman and Leandros Tassiulas Minimal evacuation times and stability 931--945 Fei Chen and Bruhadeshwar Bezawada and Alex X. Liu Privacy-preserving quantification of cross-domain network reachability . . . 946--958 Yunbae Kim and Ganguk Hwang Design and analysis of medium access protocol: throughput and short-term fairness perspective . . . . . . . . . . 959--972 Kianoosh Mokhtarian and Hans-Arno Jacobsen Minimum-delay multicast algorithms for mesh overlays . . . . . . . . . . . . . 973--986 Haiying Shen and Yuhua Lin and Jin Li A social-network-aided efficient peer-to-peer live streaming system . . . 987--1000 Thang N. Dinh and My T. Thai Network under joint node and link attacks: vulnerability assessment methods and analysis . . . . . . . . . . 1001--1011 Abdallah Jarray and Ahmed Karmouch Decomposition approaches for virtual network embedding with one-shot node and link mapping . . . . . . . . . . . . . . 1012--1025
Mohammad Ali Maddah-Ali and Urs Niesen Decentralized coded caching attains order-optimal memory-rate tradeoff . . . 1029--1040 Kai Han and Jun Luo and Liu Xiang and Mingjun Xiao and Liusheng Huang Achieving energy efficiency and reliability for data dissemination in duty-cycled WSNs . . . . . . . . . . . . 1041--1052 Qingkai Liang and Xinbing Wang and Xiaohua Tian and Fan Wu and Qian Zhang Two-dimensional route switching in cognitive radio networks: a game-theoretical framework . . . . . . . 1053--1066 Ali Khanafer and Murali Kodialam and Krishna P. N. Puttaswamy To rent or to buy in the presence of statistical information: the constrained ski-rental problem . . . . . . . . . . . 1067--1077 Majid Khabbazian and Stephane Durocher and Alireza Haghnegahdar and Fabian Kuhn Bounding interference in wireless ad hoc networks with nodes in random position 1078--1091 Marcello Caleffi and Ian F. Akyildiz and Luigi Paura On the solution of the Steiner tree NP-hard problem via \bionamePhysarum BioNetwork . . . . . . . . . . . . . . . 1092--1106 Joerg Widmer and Andrea Capalbo and Antonio Fernández Anta and Albert Banchs Efficient interlayer network codes for fair layered multicast streaming . . . . 1107--1120 G. Enrico Santagati and Tommaso Melodia and Laura Galluccio and Sergio Palazzo Medium access control and rate adaptation for ultrasonic intrabody sensor networks . . . . . . . . . . . . 1121--1134 Yu-Sian Li and Trang Minh Cao and Shu-Ting Wang and Xin Huang and Cheng-Hsin Hsu and Po-Ching Lin A resource-constrained asymmetric redundancy elimination algorithm . . . . 1135--1148 Yang Yang and Miao Jin and Yao Zhao and Hongyi Wu Distributed information storage and retrieval in $3$-D sensor networks with general topologies . . . . . . . . . . . 1149--1162 Yipeng Zhou and Tom Z. J. Fu and Dah Ming Chiu A unifying model and analysis of P2P VoD replication and scheduling . . . . . . . 1163--1175 Jianhang Gao and Qing Zhao and Ananthram Swami The thinnest path problem . . . . . . . 1176--1189 Hazem Gomaa and Geoffrey G. Messier and Robert Davies Hierarchical cache performance analysis under TTL-based consistency . . . . . . 1190--1201 Andres Garcia-Saavedra and Balaji Rengarajan and Pablo Serrano and Daniel Camps-Mur and Xavier Costa-Pérez SOLOR: self-optimizing WLANs with legacy-compatible opportunistic relays 1202--1215 Matthew Johnston and Hyang-Won Lee and Eytan Modiano A robust optimization approach to backup network design with random failures . . 1216--1228 Spyridon Antonakopoulos and Yigal Bejerano and Pramod Koppol Full protection made easy: the DisPath IP fast reroute scheme . . . . . . . . . 1229--1242 Pablo Serrano and Andres Garcia-Saavedra and Giuseppe Bianchi and Albert Banchs and Arturo Azcorra Per-frame energy consumption in 802.11 devices and its implication on modeling and design . . . . . . . . . . . . . . . 1243--1256 Jun Zhang and Xiao Chen and Yang Xiang and Wanlei Zhou and Jie Wu Robust network traffic classification 1257--1270 Fan Wu and Qianyi Huang and Yixin Tao and Guihai Chen Towards privacy preservation in strategy-proof spectrum auction mechanisms for noncooperative wireless networks . . . . . . . . . . . . . . . . 1271--1285 Hisham M. Almasaeid and Ahmed E. Kamal Receiver-based channel allocation in cognitive radio wireless mesh networks 1286--1299 Matteo Dell'Amico and Maurizio Filippone and Pietro Michiardi and Yves Roudier On user availability prediction and network applications . . . . . . . . . . 1300--1313 Enrico Gregori and Alessandro Improta and Luciano Lenzini and Lorenzo Rossi and Luca Sani A novel methodology to address the Internet AS-level data incompleteness 1314--1327 Chao Yang and Scott Jordan A novel coordinated connection access control and resource allocation framework for $4$G wireless networks . . 1328--1341 Yu Cheng and Hongkun Li and Devu Manikantan Shila and Xianghui Cao A systematic study of maximal scheduling algorithms in multiradio multichannel wireless networks . . . . . . . . . . . 1342--1355 Yuanqing Zheng and Mo Li P-MTI: physical-layer missing tag identification via compressive sensing 1356--1366 Fan Zhang and Yewen Cao and Deqiang Wang Comments and corrections: a note on ``Low-complexity distributed scheduling algorithms for wireless networks'' . . . 1367--1369
Francois Clad and Stefano Vissicchio and Pascal Mérindol and Pierre Francois and Jean-Jacques Pansiot Computing minimal update sequences for graceful router-wide reconfigurations 1373--1386 Anne Bouillard and Giovanni Stea Exact worst-case delay in FIFO-multiplexing feed-forward networks 1387--1400 Sk Kajal Arefin Imon and Adnan Khan and Mario Di Francesco and Sajal K. Das Energy-efficient randomized switching for maximizing lifetime in tree-based wireless sensor networks . . . . . . . . 1401--1415 Yi-Sheng Su Topology-transparent scheduling via the Chinese remainder theorem . . . . . . . 1416--1429 Lei Yang and Yalin E. Sagduyu and Junshan Zhang and Jason H. Li Deadline-aware scheduling with adaptive network coding for real-time traffic . . 1430--1443 Barlas O\uguz and Venkat Anantharam and Ilkka Norros Stable distributed P2P protocols based on random peer sampling . . . . . . . . 1444--1456 Yunus Sarikaya and Ozgur Ercetin and Can Emre Koksal Confidentiality-preserving control of uplink cellular wireless networks using hybrid ARQ . . . . . . . . . . . . . . . 1457--1470 Xu Chen and Brian Proulx and Xiaowen Gong and Junshan Zhang Exploiting social ties for cooperative D$2$D communications: a mobile social networking case . . . . . . . . . . . . 1471--1484 Mina Yazdanpanah and Chadi Assi and Samir Sebbah and Yousef Shayan Does network coding combined with interference cancellation bring any gain to a wireless network? . . . . . . . . . 1485--1500 Sergi Abadal and Mario Iannazzo and Mario Nemirovsky and Albert Cabellos-Aparicio and Heekwan Lee and Eduard Alarcón On the area and energy scalability of wireless network-on-chip: a model-based benchmarked design space exploration . . 1501--1513 Chenxi Qiu and Haiying Shen and Sohraab Soltani and Karan Sapra and Hao Jiang and Jason O. Hallstrom CEDAR: a low-latency and distributed strategy for packet recovery in wireless networks . . . . . . . . . . . . . . . . 1514--1527 Ioannis Ch. Paschalidis and Fuzhuo Huang and Wei Lai A message-passing algorithm for wireless network scheduling . . . . . . . . . . . 1528--1541 Bin Li and Ruogu Li and Atilla Eryilmaz Throughput-optimal scheduling design with regular service guarantees in wireless networks . . . . . . . . . . . 1542--1552 Sameh Sorour and Shahrokh Valaee Completion delay minimization for instantly decodable network codes . . . 1553--1567 Timothy Wood and K. K. Ramakrishnan and Prashant Shenoy and Jacobus Van Der Merwe and Jinho Hwang and Guyue Liu and Lucas Chaufournier CloudNet: dynamic pooling of cloud resources by live WAN migration of virtual machines . . . . . . . . . . . . 1568--1583 Sharayu Moharir and Sanjay Shakkottai Max weight versus back pressure: routing and scheduling in multichannel relay networks . . . . . . . . . . . . . . . . 1584--1598 Ferhat Dikbiyik and Massimo Tornatore and Biswanath Mukherjee Exploiting excess capacity, part II: differentiated services under traffic growth . . . . . . . . . . . . . . . . . 1599--1609 András Gulyás and Gábor Rétvári and Zalán Heszberger and Rachit Agarwal On the scalability of routing with policies . . . . . . . . . . . . . . . . 1610--1618 Enrique Mallada and Xiaoqiao Meng and Michel Hack and Li Zhang and Ao Tang Skewless network clock synchronization without discontinuity: convergence and performance . . . . . . . . . . . . . . 1619--1633 George Iosifidis and Lin Gao and Jianwei Huang and Leandros Tassiulas A double-auction mechanism for mobile data-offloading markets . . . . . . . . 1634--1647 Dan Li and Jing Zhu and Jianping Wu and Junjie Guan and Ying Zhang Guaranteeing heterogeneous bandwidth demand in multitenant data center networks . . . . . . . . . . . . . . . . 1648--1660 Wei Du and Yongjun Liao and Narisu Tao and Pierre Geurts and Xiaoming Fu and Guy Leduc Rating network paths for locality-aware overlay construction and routing . . . . 1661--1673 Virag Shah and Gustavo De Veciana High-performance centralized content delivery infrastructure: models and asymptotics . . . . . . . . . . . . . . 1674--1687 Tao Shu and Yingying Chen and Jie Yang Protecting multi-lateral localization privacy in pervasive environments . . . 1688--1701 Dahai Xu and Mung Chiang and Jennifer Rexford Corrections to ``Link-state routing with hop-by-hop forwarding can achieve optimal traffic engineering'' . . . . . 1702--1703
Reza Abdolee and Benoit Champagne Diffusion LMS strategies in sensor networks with noisy input data . . . . . 3--14 Nikolaos Chrysos and Lydia Chen and Christoforos Kachris and Manolis Katevenis Discharging the network from its flow control headaches: packet drops and HOL blocking . . . . . . . . . . . . . . . . 15--28 Emir Kavurmacioglu and Murat Alanyali and David Starobinski Competition in private commons: price war or market sharing? . . . . . . . . . 29--42 Hongyu Gao and Vinod Yegneswaran and Jian Jiang and Yan Chen and Phillip Porras and Shalini Ghosh and Haixin Duan Reexamining DNS from a global recursive resolver perspective . . . . . . . . . . 43--57 Can Zhao and Xiaojun Lin and Chuan Wu The streaming capacity of sparsely connected P2P systems with distributed control . . . . . . . . . . . . . . . . 58--71 Xiaohan Kang and Weina Wang and Juan José Jaramillo and Lei Ying On the performance of largest-deficit-first for scheduling real-time traffic in wireless networks 72--84 Chih-Yu Wang and Chun-Han Ko and Hung-Yu Wei and Athanasios V. Vasilakos A voting-based femtocell downlink cell-breathing control mechanism . . . . 85--98 Lei Jiao and Jun Li and Tianyin Xu and Wei Du and Xiaoming Fu Optimizing cost for online social networks on geo-distributed clouds . . . 99--112 Mohamed Kashef and Anthony Ephremides Optimal partial relaying for energy-harvesting wireless networks . . 113--122 Ted H. Szymanski An ultra-low-latency guaranteed-rate Internet for cloud services . . . . . . 123--136 Eunice Adjarath Lemamou and Philippe Galinier and Steven Chamberland A hybrid iterated local search algorithm for the global planning problem of survivable 4G wireless networks . . . . 137--148 Gábor Rétvári and János Tapolcai and Attila K\Horösi and András Majdán and Zalán Heszberger Compressing IP forwarding tables: towards entropy bounds and beyond . . . 149--162 Parinaz Naghizadeh and Mingyan Liu Perceptions and truth: a mechanism design approach to crowd-sourcing reputation . . . . . . . . . . . . . . . 163--176 Zhoujia Mao and Can Emre Koksal and Ness B. Shroff Optimal online scheduling with arbitrary hard deadlines in multihop communication networks . . . . . . . . . . . . . . . . 177--189 Weina Wang and Kai Zhu and Lei Ying and Jian Tan and Li Zhang MapTask scheduling in MapReduce with data locality: throughput and heavy-traffic optimality . . . . . . . . 190--203 Hussein Al-Zubaidy and Jörg Liebeherr and Almut Burchard Network-layer performance analysis of multihop fading channels . . . . . . . . 204--217 Marcin Bienkowski and Leszek G\kasieniec and Marek Klonowski and Miroslaw Korzeniowski and Bernard Mans and Stefan Schmid and Roger Wattenhofer Distributed alarming in the on-duty and off-duty models . . . . . . . . . . . . 218--230 Chen Qian and Simon S. Lam A scalable and resilient layer-2 network with Ethernet compatibility . . . . . . 231--244 Eleni Stai and Symeon Papavassiliou and John S. Baras Performance-aware cross-layer design in wireless multihop networks via a weighted backpressure approach . . . . . 245--258 Xiaowen Gong and Junshan Zhang and Douglas Cochran and Kai Xing Optimal placement for barrier coverage in bistatic radar sensor networks . . . 259--271 Feng Wang and Jiangchuan Liu and Minghua Chen and Haiyang Wang Migration towards cloud-assisted live media streaming . . . . . . . . . . . . 272--282 Soheil Eshghi and M. H. R. Khouzani and Saswati Sarkar and Santosh S. Venkatesh Optimal patching in clustered malware epidemics . . . . . . . . . . . . . . . 283--298 Giusi Alfano and Michele Garetto and Emilio Leonardi Content-centric wireless networks with limited buffers: when mobility hurts . . 299--311 Ziling Zhou and Binbin Chen and Haifeng Yu Understanding RFID counting protocols 312--327 Guang Tan and Zhimeng Yin and Hongbo Jiang Trap array: a unified model for scalability evaluation of geometric routing . . . . . . . . . . . . . . . . 328--341 Jeremy M. Plante and Arush Gadkar and Vinod M. Vokkarane Manycast overlay in split-incapable networks for supporting bandwidth-intensive applications . . . . 342--354 Robert Margolies and Ashwin Sridharan and Vaneet Aggarwal and Rittwik Jana and N. K. Shankaranarayanan and Vinay A. Vaishampayan and Gil Zussman Exploiting mobility in proportional fair cellular scheduling: measurements and algorithms . . . . . . . . . . . . . . . 355--367 Pedro E. Santacruz and Vaneet Aggarwal and Ashutosh Sabharwal Leveraging physical-layer capabilities: distributed scheduling in interference networks with local views . . . . . . . 368--382 Kundan Kandhway and Joy Kuri Campaigning in heterogeneous social networks: optimal control of SI information epidemics . . . . . . . . . 383--396 Wen Luo and Yan Qiao and Shigang Chen and Min Chen An efficient protocol for RFID multigroup threshold-based classification based on sampling and logical bitmap . . . . . . . . . . . . . 397--407 Kai Zhu and Lei Ying Information source detection in the SIR model: a sample-path-based approach . . 408--421 Chen Chen and Hans-Arno Jacobsen and Roman Vitenberg Algorithms based on divide and conquer for topic-based publish/subscribe overlay design . . . . . . . . . . . . . 422--436 Valentino Pacifici and Frank Lehrieder and György Dán Cache bandwidth allocation for P2P file-sharing systems to minimize inter-ISP traffic . . . . . . . . . . . 437--448 Qiang Liu and Xin Wang and Nageswara S. V. Rao and Katharine Brigham and B. V. K. Vijaya Kumar Effect of retransmission and retrodiction on estimation and fusion in long-haul sensor networks . . . . . . . 449--461 Fengyu Gao and Hongyan Qian Efficient, real-world token bucket configuration for residential gateways 462--475 Sophia Athanasiadou and Marios Gatzianas and Leonidas Georgiadis and Leandros Tassiulas Stable XOR-based policies for the broadcast erasure channel with feedback 476--491 Albert Banchs and Jorge Ortin and Andres Garcia-Saavedra and Douglas J. Leith and Pablo Serrano Thwarting selfish behavior in 802.11 WLANs . . . . . . . . . . . . . . . . . 492--505 Florin Coras and Jordi Domingo-Pascual and Darrel Lewis and Albert Cabellos-Aparicio An analytical model for Loc/ID mappings caches . . . . . . . . . . . . . . . . . 506--516 Yi Gao and Wei Dong and Chun Chen and Jiajun Bu and Wenbin Wu and Xue Liu iPath: path inference in wireless sensor networks . . . . . . . . . . . . . . . . 517--528 Jayakrishnan Nair and Martin Andreasson and Lachlan L. H. Andrew and Steven H. Low and John C. Doyle On channel failures, file fragmentation policies, and heavy-tailed completion times . . . . . . . . . . . . . . . . . 529--541 Mohammad Hadi Afrasiabi and Roch Guérin Exploring user-provided connectivity . . 542--554 Ori Rottenstreich and Isaac Keslassy and Avinatan Hassidim and Haim Kaplan and Ely Porat Optimal in/out TCAM encodings of ranges 555--568 Flavio Esposito and Donato Di Paola and Ibrahim Matta On distributed virtual network embedding with guarantees . . . . . . . . . . . . 569--582 Xiaochun Yun and Yipeng Wang and Yongzheng Zhang and Yu Zhou A semantics-aware approach to the automated network protocol identification . . . . . . . . . . . . . 583--595 Qiuyu Peng and Anwar Walid and Jaehyun Hwang and Steven H. Low Multipath TCP: analysis, design, and implementation . . . . . . . . . . . . . 596--609 James Daly and Alex X. Liu and Eric Torng A difference resolution approach to compressing access control lists . . . . 610--623 Ahmed Farhan Hanif and Hamidou Tembine and Mohamad Assaad and Djamal Zeghlache Mean-field games for resource sharing in cloud-based networks . . . . . . . . . . 624--637
Dong Zhao and Xiang-Yang Li and Huadong Ma Budget-feasible online incentive mechanisms for crowdsourcing tasks truthfully . . . . . . . . . . . . . . . 647--661 Daibo Liu and Mengshu Hou and Zhichao Cao and Jiliang Wang and Yuan He and Yunhao Liu Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks . . . . . . . . . . . . 662--673 Joaquim Oller and Ilker Demirkol and Jordi Casademont and Josep Paradells and Gerd Ulrich Gamm and Leonhard Reindl Has time come to switch from duty-cycled MAC protocols to wake-up radio for wireless sensor networks? . . . . . . . 674--687 Abhishek Mishra and Parv Venkitasubramaniam Anonymity and fairness in packet scheduling: a quantitative tradeoff . . 688--702 Min Chen and Wen Luo and Zhen Mo and Shigang Chen and Yuguang Fang An efficient tag search protocol in large-scale RFID systems with noisy channel . . . . . . . . . . . . . . . . 703--716 Alireza Shams Shafigh and Beatriz Lorenzo and Savo Glisic and Jordi Pérez-Romero and Luiz A. DaSilva and Allen B. MacKenzie and Juha Röning A framework for dynamic network architecture and topology optimization 717--730 Zakaria Al-Qudah and Eamon Johnson and Michael Rabinovich and Oliver Spatscheck Internet with transient destination-controlled addressing . . . 731--744 Zhi Zhang and Yigal Bejerano and Spyridon Antonakopoulos Energy-efficient IP core network configuration under general traffic demands . . . . . . . . . . . . . . . . 745--758 Michael J. Neely Distributed stochastic optimization via correlated scheduling . . . . . . . . . 759--772 Sazzadur Rahman and Ting-Kai Huang and Harsha V. Madhyastha and Michalis Faloutsos Detecting malicious Facebook applications . . . . . . . . . . . . . . 773--787 Xudong Wang and Wenguang Mao Analog network coding without restrictions on superimposed frames . . 788--805 Tong Meng and Fan Wu and Guihai Chen Code-based neighbor discovery protocols in mobile wireless networks . . . . . . 806--819 Vinay Joseph and Sem Borst and Martin I. Reiman Optimal rate allocation for video streaming in wireless networks with user dynamics . . . . . . . . . . . . . . . . 820--835 Ramtin Pedarsani and Mohammad Ali Maddah-Ali and Urs Niesen Online coded caching . . . . . . . . . . 836--845 Jinsong Han and Chen Qian and Panlong Yang and Dan Ma and Zhiping Jiang and Wei Xi and Jizhong Zhao GenePrint: generic and accurate physical-layer identification for UHF RFID tags . . . . . . . . . . . . . . . 846--858 Kun Xie and Xin Wang and Jigang Wen and Jiannong Cao Cooperative routing with relay assignment in multiradio multihop wireless networks . . . . . . . . . . . 859--872 Jian Guo and Fangming Liu and John C. S. Lui and Hai Jin Fair network bandwidth allocation in IaaS datacenters via a cooperative game approach . . . . . . . . . . . . . . . . 873--886 Hongkun Yang and Simon S. Lam Real-time verification of network properties using atomic predicates . . . 887--900 Mustafa Y. Arslan and Karthikeyan Sundaresan and Srikanth V. Krishnamurthy and Sampath Rangarajan iBUS: an integrated beamformer and uplink scheduler for OFDMA small cells 901--914 Karthikeyan Sundaresan and Mustafa Y. Arslan and Shailendra Singh and Sampath Rangarajan and Srikanth V. Krishnamurthy FluidNet: a flexible cloud-based radio access network for small cells . . . . . 915--928 Huiyuan Zhang and Dung T. Nguyen and Huiling Zhang and My T. Thai Least cost influence maximization across multiple social networks . . . . . . . . 929--939 Chee Wei Tan Optimal power control in Rayleigh-fading heterogeneous wireless networks . . . . 940--953 Ying Cui and Edmund M. Yeh and Ran Liu Enhancing the delay performance of dynamic backpressure algorithms . . . . 954--967 Rihua Wei and Yang Xu and H. Jonathan Chao Finding nonequivalent classifiers in Boolean space to reduce TCAM usage . . . 968--981 Jayakrishnan Nair and Krishna Jagannathan and Adam Wierman When heavy-tailed and light-tailed flows compete: the response time tail under generalized max-weight scheduling . . . 982--995 Hasti A. Pedersen and Sujit Dey Enhancing mobile video capacity and quality using rate adaptation, RAN caching and processing . . . . . . . . . 996--1010 Mingchen Zhao and Wenchao Zhou and Alexander J. T. Gurney and Andreas Haeberlen and Micah Sherr and Boon Thau Loo Private and verifiable interdomain routing decisions . . . . . . . . . . . 1011--1024 Han Cai and Irem Koprulu and Ness B. Shroff Exploiting double opportunities for latency-constrained content propagation in wireless networks . . . . . . . . . . 1025--1037 Tao Han and Nirwan Ansari A traffic load balancing framework for software-defined radio access networks powered by hybrid energy sources . . . . 1038--1051 Wei Gong and Ivan Stojmenovic and Amiya Nayak and Kebin Liu and Haoxiang Liu Fast and scalable counterfeits estimation for large-scale RFID systems 1052--1064 Chandramani Singh and Anurag Kumar and Rajesh Sundaresan Combined base station association and power control in multichannel cellular networks . . . . . . . . . . . . . . . . 1065--1080 Dong-Hoon Shin and Shibo He and Junshan Zhang Robust and cost-effective design of cyber-physical systems: an optimal middleware deployment approach . . . . . 1081--1094 Sang-Yoon Chang and Yih-Chun Hu and Nicola Laurenti SimpleMAC: a simple wireless MAC-layer countermeasure to intelligent and insider jammers . . . . . . . . . . . . 1095--1108 Gaurav Agrawal and Deep Medhi Embedding IP unique shortest path topology on a wavelength-routed network: normal and survivable design . . . . . . 1109--1124 Dao-Yuan Chang and Pi-Chung Wang TCAM-based multi-match packet classification using multidimensional rule layering . . . . . . . . . . . . . 1125--1138 Xuanyu Cao and Jinbei Zhang and Luoyi Fu and Weijie Wu and Xinbing Wang Optimal secrecy capacity-delay tradeoff in large-scale mobile ad hoc networks 1139--1152 Zhangyu Guan and Tommaso Melodia and Gesualdo Scutari To transmit or not to transmit?: distributed queueing games in infrastructureless wireless networks . . 1153--1166 Abhijeet Bhorkar and Mohammad Naghshvar and Tara Javidi Opportunistic routing with congestion diversity in wireless ad hoc networks 1167--1180 Yunus Sarikaya and C. Emre Koksal and Ozgur Ercetin Dynamic network control for confidential multi-hop communications . . . . . . . . 1181--1195 Majed Alresaini and Kwame-Lante Wright and Bhaskar Krishnamachari and Michael J. Neely Backpressure delay enhancement for encounter-based mobile networks while sustaining throughput optimality . . . . 1196--1208 Guan-Hua Tu and Yuanjie Li and Chunyi Peng and Chi-Yu Li and Songwu Lu Detecting problematic control-plane protocol interactions in mobile networks 1209--1222 Ashok Anand and Athula Balachandran and Aditya Akella and Vyas Sekar and Srinivasan Seshan Enhancing video accessibility and availability using information-bound references . . . . . . . . . . . . . . . 1223--1236 Andra Lutu and Marcelo Bagnulo and Cristel Pelsser and Olaf Maennel and Jesus Cid-Sueiro The BGP visibility toolkit: detecting anomalous Internet routing behavior . . 1237--1250 Kirill Kogan and Sergey I. Nikolenko and Ori Rottenstreich and William Culhane and Patrick Eugster Exploiting order independence for scalable and expressive packet classification . . . . . . . . . . . . . 1251--1264 Shizhen Zhao and Xiaojun Lin Design of scheduling algorithms for end-to-end backlog minimization in wireless multi-hop networks under $k$-hop interference models . . . . . . 1265--1278 Qingsi Wang and Mingyan Liu Learning in hide-and-seek . . . . . . . 1279--1292
Alex X. Liu and Chad R. Meiners and Eric Torng Packet classification using binary content addressable memory . . . . . . . 1295--1307 M. Zubair Shafiq and Lusheng Ji and Alex X. Liu and Jeffrey Pang and Shobha Venkataraman and Jia Wang Characterizing and optimizing cellular network performance during crowded events . . . . . . . . . . . . . . . . . 1308--1321 Soongeol Kwon and Natarajan Gautam Time-stable performance in parallel queues with non-homogeneous and multi-class workloads . . . . . . . . . 1322--1335 Abishek Gopalan and Srinivasan Ramasubramanian IP fast rerouting and disjoint multipath routing with three edge-independent spanning trees . . . . . . . . . . . . . 1336--1349 Yi Qin and Xiaohua Tian and Weijie Wu and Xinbing Wang Mobility weakens the distinction between multicast and unicast . . . . . . . . . 1350--1363 Yu Lu and Mehul Motani and Wai-Choong Wong A QoE-aware resource distribution framework incentivizing context sharing and moderate competition . . . . . . . . 1364--1377 Richard J. La Interdependent security with strategic agents and cascades of infection . . . . 1378--1391 Yi Gao and Wei Dong and Wenbin Wu and Chun Chen and Xiang-Yang Li and Jiajun Bu Scalpel: scalable preferential link tomography based on graph trimming . . . 1392--1403 Jia Liu and Ness B. Shroff and Cathy H. Xia and Hanif D. Sherali Joint congestion control and routing optimization: an efficient second-order distributed approach . . . . . . . . . . 1404--1420 Stefan Schmid and Chen Avin and Christian Scheideler and Michael Borokhovich and Bernhard Haeupler and Zvi Lotker SplayNet: towards locally self-adjusting networks . . . . . . . . . . . . . . . . 1421--1433 Wei Dai and Scott Jordan ISP service tier design . . . . . . . . 1434--1447 Tian Pan and Ting Zhang and Junxiao Shi and Yang Li and Linxiao Jin and Fuliang Li and Jiahai Yang and Beichuan Zhang and Xueren Yang and Mingui Zhang and Huichen Dai and Bin Liu Towards zero-time wakeup of line cards in power-aware routers . . . . . . . . . 1448--1461 Kai Han and Chi Zhang and Jun Luo Taming the uncertainty: budget limited robust crowdsensing through online learning . . . . . . . . . . . . . . . . 1462--1475 Changhee Joo and Xiaojun Lin and Jiho Ryu and Ness B. Shroff Distributed greedy approximation to maximum weighted independent set for scheduling with fading channels . . . . 1476--1488 Matti Siekkinen and Mohammad Ashraful Hoque and Jukka K. Nurminen Using viewing statistics to control energy and traffic overhead in mobile video streaming . . . . . . . . . . . . 1489--1503 Huasen Wu and Xiaojun Lin and Xin Liu and Youguang Zhang Application-level scheduling with probabilistic deadline constraints . . . 1504--1517 Rafael Laufer and Leonard Kleinrock The capacity of wireless CSMA/CA networks . . . . . . . . . . . . . . . . 1518--1532 Morteza Mardani and Georgios B. Giannakis Estimating traffic and anomaly maps via network tomography . . . . . . . . . . . 1533--1547 Yan Qiao and Shigang Chen and Tao Li and Shiping Chen Tag-ordering polling protocols in RFID systems . . . . . . . . . . . . . . . . 1548--1561 Sachin Kadloor and Negar Kiyavash and Parv Venkitasubramaniam Mitigating timing side channel in shared schedulers . . . . . . . . . . . . . . . 1562--1573 Pouya Ostovari and Jie Wu and Abdallah Khreishah and Ness B. Shroff Scalable video streaming with helper nodes using random linear network coding 1574--1587 Ahmad Beirami and Mohsen Sardari and Faramarz Fekri Packet-level network compression: realization and scaling of the network-wide benefits . . . . . . . . . 1588--1604 Jinsong Han and Chen Qian and Xing Wang and Dan Ma and Jizhong Zhao and Wei Xi and Zhiping Jiang and Zhi Wang Twins: device-free object tracking using passive tags . . . . . . . . . . . . . . 1605--1617 Hang Li and Chuan Huang and Ping Zhang and Shuguang Cui and Junshan Zhang Distributed opportunistic scheduling for energy harvesting based wireless networks: a two-stage probing approach 1618--1631 Yongmin Zhang and Shibo He and Jiming Chen Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks . . . . . . . . . . . . 1632--1646 Jeongho Kwak and Okyoung Choi and Song Chong and Prasant Mohapatra Processor-network speed scaling for energy: delay tradeoff in smartphone applications . . . . . . . . . . . . . . 1647--1660 Jongho Won and Chris Y. T. Ma and David K. Y. Yau and Nageswara S. V. Rao Privacy-assured aggregation protocol for smart metering: a proactive fault-tolerant approach . . . . . . . . 1661--1674 Zhangyu Guan and Tommaso Melodia and Dongfeng Yuan and Dimitris A. Pados Distributed resource management for cognitive ad hoc networks with cooperative relays . . . . . . . . . . . 1675--1689 Sharayu Moharir and Sujay Sanghavi and Sanjay Shakkottai Online load balancing under graph constraints . . . . . . . . . . . . . . 1690--1703 Matteo Avalle and Fulvio Risso and Riccardo Sisto Scalable algorithms for NFA multi-striding and NFA-based deep packet inspection on GPUs . . . . . . . . . . . 1704--1717 Kobi Cohen and Amir Leshem Distributed game-theoretic optimization and management of multichannel ALOHA networks . . . . . . . . . . . . . . . . 1718--1731 Dejun Yang and Guoliang Xue and Xi Fang and Jian Tang Incentive mechanisms for crowdsensing: crowdsourcing with smartphones . . . . . 1732--1744 Jinsung Lee and Hojin Lee and Yung Yi and Song Chong and Edward W. Knightly and Mung Chiang Making 802.11 DCF near-optimal: design, implementation, and evaluation . . . . . 1745--1758 Kai Liu and Joseph K. Y. Ng and Victor C. S. Lee and Sang H. Son and Ivan Stojmenovic Cooperative data scheduling in hybrid vehicular ad hoc networks: VANET as a software defined network . . . . . . . . 1759--1773 Seon Yeong Han and Nael B. Abu-Ghazaleh and Dongman Lee Efficient and consistent path loss model for mobile network simulation . . . . . 1774--1786 Hulya Seferoglu and Eytan Modiano Separation of routing and scheduling in backpressure: based wireless networks 1787--1800 Wenzhuo Ouyang and Atilla Eryilmaz and Ness B. Shroff Downlink scheduling over Markovian fading channels . . . . . . . . . . . . 1801--1812 Roberto Gonzalez and Ruben Cuevas and Reza Motamedi and Reza Rejaie and Angel Cuevas Assessing the evolution of Google+ in its first two years . . . . . . . . . . 1813--1826 Hongxing Li and Chuan Wu and Zongpeng Li and Francis C. M. Lau Virtual machine trading in a federation of clouds: individual profit and social welfare maximization . . . . . . . . . . 1827--1840 Xun Gong and Negar Kiyavash Quantifying the information leakage in timing side channels in deterministic work-conserving schedulers . . . . . . . 1841--1852 Jose Yallouz and Ori Rottenstreich and Ariel Orda Tunable survivable spanning trees . . . 1853--1866 Bin Li and Ruogu Li and Atilla Eryilmaz Wireless scheduling design for optimizing both service regularity and mean delay in heavy-traffic regimes . . 1867--1880 Qianyi Huang and Yang Gui and Fan Wu and Guihai Chen and Qian Zhang A general privacy-preserving auction mechanism for secondary spectrum markets 1881--1893 Arnob Ghosh and Saswati Sarkar Quality-sensitive price competition in secondary market spectrum oligopoly: single location game . . . . . . . . . . 1894--1907 Zizhong Cao and Murali Kodialam and T. V. Lakshman Joint static and dynamic traffic scheduling in data center networks . . . 1908--1918 Zhenzhe Zheng and Fan Wu and Shaojie Tang and Guihai Chen AEGIS: an unknown combinatorial auction mechanism framework for heterogeneous spectrum redistribution in noncooperative wireless networks . . . . 1919--1932
Hamlet Medina Ruiz and Michel Kieffer and Beatrice Pesquet-Popescu TCP and Network Coding: Equilibrium and Dynamic Properties . . . . . . . . . . . 1935--1947 Zhidan Liu and Zhenjiang Li and Mo Li and Wei Xing and Dongming Lu Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing . . . . . . . . . . . . . . . . 1948--1960 Gaurav Raina and Sreelakshmi Manjunath and Sai Prasad and Krishnamurthy Giridhar Stability and Performance Analysis of Compound TCP With REM and Drop-Tail Queue Management . . . . . . . . . . . . 1961--1974 Jianxia Ning and Shailendra Singh and Konstantinos Pelechrinis and Bin Liu and Srikanth V. Krishnamurthy and Ramesh Govindan Forensic Analysis of Packet Losses in Wireless Networks . . . . . . . . . . . 1975--1988 Yi Qin and Riheng Jia and Jinbei Zhang and Weijie Wu and Xinbing Wang Impact of Social Relation and Group Size in Multicast Ad Hoc Networks . . . . . . 1989--2004 Ahmed Osama Fathy Atya and Ioannis Broustis and Shailendra Singh and Dimitris Syrivelis and Srikanth V. Krishnamurthy and Thomas F. La Porta A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding 2005--2018 Pooja Vyavahare and Nutan Limaye and D. Manjunath Optimal Embedding of Functions for In-Network Computation: Complexity Analysis and Algorithms . . . . . . . . 2019--2032 Prasanna Chaporkar and Stefan Magureanu and Alexandre Proutiere Optimal Distributed Scheduling in Wireless Networks Under the SINR Interference Model . . . . . . . . . . . 2033--2045 Mihalis G. Markakis and Eytan Modiano and John N. Tsitsiklis Delay Stability of Back-Pressure Policies in the Presence of Heavy-Tailed Traffic . . . . . . . . . . . . . . . . 2046--2059 Weijie Shi and Linquan Zhang and Chuan Wu and Zongpeng Li and Francis C. M. Lau An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing 2060--2073 Reuven Cohen and Gabi Nakibly Restorable Logical Topology in the Face of No or Partial Traffic Demand Knowledge . . . . . . . . . . . . . . . 2074--2085 Jeffrey Wildman and Steven Weber On Characterizing the Local Pooling Factor of Greedy Maximal Scheduling in Random Graphs . . . . . . . . . . . . . 2086--2099 Chen Qian and Simon S. Lam Greedy Routing by Network Distance Embedding . . . . . . . . . . . . . . . 2100--2113 David Applegate and Aaron Archer and Vijay Gopalakrishnan and Seungjoon Lee and K. K. Ramakrishnan Optimal Content Placement for a Large-Scale VoD System . . . . . . . . . 2114--2127 Xiaofei Liao and Li Lin and Guang Tan and Hai Jin and Xiaobin Yang and Wei Zhang and Bo Li LiveRender: a Cloud Gaming System Based on Compressed Graphics Streaming . . . . 2128--2139 Bassel Saleh and Dongyu Qiu Performance Analysis of Network-Coding-Based P2P Live Streaming Systems . . . . . . . . . . . . . . . . 2140--2153 Luwei Cheng and Francis C. M. Lau Revisiting TCP Congestion Control in a Virtual Cluster Environment . . . . . . 2154--2167 Guanfeng Liang and Ulas C. Kozat On Throughput-Delay Optimal Access to Storage Clouds via Load Adaptive Coding and Chunking . . . . . . . . . . . . . . 2168--2181 Anh Le and Athina Markopoulou and Alexandros G. Dimakis Auditing for Distributed Storage Systems 2182--2195 Zain Shamsi and Ankur Nandwani and Derek Leonard and Dmitri Loguinov Hershel: Single-Packet OS Fingerprinting 2196--2209 Yang Peng and Kai Chen and Guohui Wang and Wei Bai and Yangming Zhao and Hao Wang and Yanhui Geng and Zhiqiang Ma and Lin Gu Towards Comprehensive Traffic Forecasting in Cloud Computing: Design and Application . . . . . . . . . . . . 2210--2222 Michael J. Neely Energy-Aware Wireless Scheduling With Near-Optimal Backlog and Convergence Time Tradeoffs . . . . . . . . . . . . . 2223--2236 Longbo Huang and Shaoquan Zhang and Minghua Chen and Xin Liu When Backpressure Meets Predictive Scheduling . . . . . . . . . . . . . . . 2237--2250 Joachim Fabini and Tanja Zseby The Right Time: Reducing Effective End-to-End Delay in Time-Slotted Packet-Switched Networks . . . . . . . . 2251--2263 Xiaohan Wei and Michael J. Neely Power-Aware Wireless File Downloading: a Lyapunov Indexing Approach to a Constrained Restless Bandit Problem . . 2264--2277 Jaewook Kwak and Chul-Ho Lee and Do Young Eun A High-Order Markov-Chain-Based Scheduling Algorithm for Low Delay in CSMA Networks . . . . . . . . . . . . . 2278--2290 Mehdi Nikkhah and Roch Guerin Migrating the Internet to IPv6: an Exploration of the When and Why . . . . 2291--2304 Rui Li and Alex X. Liu and Ann L. Wang and Bezawada Bruhadeshwar Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing . . . . . . . . . . . . . . . 2305--2318 Joongheon Kim and Giuseppe Caire and Andreas F. Molisch Quality-Aware Streaming and Scheduling for Device-to-Device Video Delivery . . 2319--2331 Mohammad Javad Hajikhani and Thomas Kunz and Howard Schwartz A Recursive Method for Clock Synchronization in Asymmetric Packet-Based Networks . . . . . . . . . 2332--2342 Cheng-Shang Chang and Wanjiun Liao and Tsung-Ying Wu Tight Lower Bounds for Channel Hopping Schemes in Cognitive Radio Networks . . 2343--2356 John Tadrous and Atilla Eryilmaz and Hesham El Gamal Joint Smart Pricing and Proactive Content Caching for Mobile Services . . 2357--2371 Wei Dong and Jie Yu and Jiliang Wang and Xuefeng Zhang and Yi Gao and Chun Chen and Jiajun Bu Accurate and Robust Time Reconstruction for Deployed Sensor Networks . . . . . . 2372--2385 Guibin Tian and Yong Liu Towards Agile and Smooth Video Adaptation in HTTP Adaptive Streaming 2386--2399 Alex X. Liu and Eric Torng Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching 2400--2415 Jaeseong Jeong and Yung Yi and Jeong-Woo Cho and Do Young Eun and Song Chong Energy-Efficient Wi-Fi Sensing Policy Under Generalized Mobility Patterns With Aging . . . . . . . . . . . . . . . . . 2416--2428 Gianfranco Nencioni and Nishanth Sastry and Gareth Tyson and Vijay Badrinarayanan and Dmytro Karamshuk and Jigna Chandaria and Jon Crowcroft SCORE: Exploiting Global Broadcasts to Create Offline Personal Channels for On-Demand Access . . . . . . . . . . . . 2429--2442 Yu Xiang and Tian Lan and Vaneet Aggarwal and Yih-Farn R. Chen Joint Latency and Cost Optimization for Erasure-Coded Data Center Storage . . . 2443--2457 Srikanth Hariharan and Ness B. Shroff On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Trees Under the $K$-Hop Interference Model . . . . . . . . . . . . . . . . . 2458--2471 Chen Wang and Hongbo Jiang and Tianlong Yu and John C. S. Lui SLICE: Enabling Greedy Routing in High Genus $3$-D WSNs With General Topologies 2472--2484 Wei Dong and Swati Rallapalli and Lili Qiu and K. K. Ramakrishnan and Yin Zhang Double Auctions for Dynamic Spectrum Allocation . . . . . . . . . . . . . . . 2485--2497 Wan Du and Zhenjiang Li and Jansen Christian Liando and Mo Li From Rateless to Distanceless: Enabling Sparse Sensor Network Deployment in Large Areas . . . . . . . . . . . . . . 2498--2511 Felix Ming Fai Wong and Zhenming Liu and Mung Chiang On the Efficiency of Social Recommender Networks . . . . . . . . . . . . . . . . 2512--2524 Lidia Donvito and Laura Galluccio and Alfio Lombardo and Giacomo Morabito $ \mu $-NET: a Network for Molecular Biology Applications in Microfluidic Chips . . . . . . . . . . . . . . . . . 2525--2538 Mehdi Malboubi and Cuong Vu and Chen-Nee Chuah and Puneet Sharma Decentralizing Network Inference Problems With Multiple-Description Fusion Estimation MDFE . . . . . . . . . 2539--2552 Tobias Harks and Martin Hoefer and Kevin Schewior and Alexander Skopalik Routing Games With Progressive Filling 2553--2562 Richard T. B. Ma Subsidization Competition: Vitalizing the Neutral Internet . . . . . . . . . . 2563--2576
Huasen Wu and Xiaojun Lin and Xin Liu and Kun Tan and Yongguang Zhang CoSchd: Coordinated Scheduling With Channel and Load Awareness for Alleviating Cellular Congestion . . . . 2579--2592 Di Niu and Baochun Li and Di Niu and Baochun Li An Asynchronous Fixed-Point Algorithm for Resource Sharing With Coupled Objectives . . . . . . . . . . . . . . . 2593--2606 Can Zhao and Jian Zhao and Xiaojun Lin and Chuan Wu Capacity of P2P On-Demand Streaming With Simple, Robust, and Decentralized Control . . . . . . . . . . . . . . . . 2607--2620 Luis Amaral Lopes and Rute Sofia and Huseyin Haci and Huiling Zhu A Proposal for Dynamic Frequency Sharing in Wireless Networks . . . . . . . . . . 2621--2633 Karla Kvaternik and Jaime Llorca and Daniel Kilper and Lacra Pavel A Methodology for the Design of Self-Optimizing, Decentralized Content-Caching Strategies . . . . . . . 2634--2647 Shravan Garlapati and Teja Kuruganti and Michael R. Buehrer and Jeffrey H. Reed and Shravan Garlapati and Teja Kuruganti and Michael R. Buehrer and Jeffrey H. Reed SMAC: a Soft MAC to Reduce Control Overhead and Latency in CDMA-Based AMI Networks . . . . . . . . . . . . . . . . 2648--2662 Angelos Chatzipapas and Vincenzo Mancuso An M/G/1 Model for Gigabit Energy Efficient Ethernet Links With Coalescing and Real-Trace-Based Evaluation . . . . 2663--2675 Victor Valls and Douglas J. Leith Max-Weight Revisited: Sequences of Nonconvex Optimizations Solving Convex Optimizations . . . . . . . . . . . . . 2676--2689 Bei Liu and Wei Wang and Donghyun Kim and Deying Li and Jingyi Wang and Alade O. Tokuta and Yaolin Jiang On Approximating Minimum $3$-Connected $m$-Dominating Set Problem in Unit Disk Graph . . . . . . . . . . . . . . . . . 2690--2701 Yuxiao Hou and Jiajue Ou and Yuanqing Zheng and Mo Li PLACE: Physical Layer Cardinality Estimation for Large-Scale RFID Systems 2702--2714 John Tadrous and Atilla Eryilmaz On Optimal Proactive Caching for Mobile Networks With Demand Uncertainties . . . 2715--2727 Matteo Varvello and Rafael Laufer and Feixiong Zhang and T. V. Lakshman Multilayer Packet Classification With Graphics Processing Units . . . . . . . 2728--2741 Sen Wang and Jun Bi and Jianping Wu and Athanasios V. Vasilakos CPHR: In-Network Caching for Information-Centric Networking With Partitioning and Hash-Routing . . . . . 2742--2755 Wei Gong and Haoxiang Liu and Lei Chen and Kebin Liu and Yunhao Liu Fast Composite Counting in RFID Systems 2756--2767 Shuihai Hu and Kai Chen and Haitao Wu and Wei Bai and Chang Lan and Hao Wang and Hongze Zhao and Chuanxiong Guo Explicit Path Control in Commodity Data Centers: Design and Applications . . . . 2768--2781 Guodong Shi and Bo Li and Mikael Johansson and Karl Henrik Johansson Finite-Time Convergent Gossiping . . . . 2782--2794 Xu Chen and Lei Jiao and Wenzhong Li and Xiaoming Fu Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing . . . . . . . . . . . . . . . 2795--2808 Johannes Dams and Martin Hoefer and Thomas Kesselheim Jamming-Resistant Learning in Wireless Networks . . . . . . . . . . . . . . . . 2809--2818 Mingyang Zhang and Changsheng You and Zuqing Zhu On the Parallelization of Spectrum Defragmentation Reconfigurations in Elastic Optical Networks . . . . . . . . 2819--2833 Jinxue Zhang and Rui Zhang and Jingchao Sun and Yanchao Zhang and Chi Zhang and Jinxue Zhang and Rui Zhang and Jingchao Sun and Yanchao Zhang and Chi Zhang TrueTop: a Sybil-Resilient System for User Influence Measurement on Twitter 2834--2846 Donggyu Yun and Dongmyung Lee and Se-Young Yun and Jinwoo Shin and Yung Yi Delay Optimal CSMA With Linear Virtual Channels Under a General Topology . . . 2847--2857 Xiaoyong Li and Daren B. H. Cline and Dmitri Loguinov On Sample-Path Staleness in Lazy Data Replication . . . . . . . . . . . . . . 2858--2871 Stepan Kucera and David Lopez-Perez Inter-Cell Interference Coordination for Control Channels in LTE Heterogeneous Networks . . . . . . . . . . . . . . . . 2872--2884 Jinsong Han and Han Ding and Chen Qian and Wei Xi and Zhi Wang and Zhiping Jiang and Longfei Shangguan and Jizhong Zhao and Jinsong Han and Han Ding and Chen Qian and Wei Xi and Zhi Wang and Zhiping Jiang and Longfei Shangguan and Jizhong Zhao CBID: a Customer Behavior Identification System Using Passive Tags . . . . . . . 2885--2898 Ulas C. Kozat and Guanfeng Liang and Koray Kokten and Janos Tapolcai On Optimal Topology Verification and Failure Localization for Software Defined Networks . . . . . . . . . . . . 2899--2912 Dan Li and Yirong Yu and Junxiao Shi and Beichuan Zhang PALS: Saving Network Power With Low Overhead to ISPs and Applications . . . 2913--2925 Xiang Wang and Weiqi Shi and Yang Xiang and Jun Li Efficient Network Security Policy Enforcement With Policy Space Analysis 2926--2938 Sonia A. Bhaskar and Sonia A. Bhaskar Localization From Connectivity: a $1$-bit Maximum Likelihood Approach . . 2939--2953 Arpan Chattopadhyay and Marceau Coupechoux and Anurag Kumar Sequential Decision Algorithms for Measurement-Based Impromptu Deployment of a Wireless Relay Network Along a Line 2954--2968 Yang Song and Arun Venkataramani and Lixin Gao Identifying and Addressing Reachability and Policy Attacks in ``Secure'' BGP . . 2969--2982 Anh Le and Lorenzo Keller and Hulya Seferoglu and Blerim Cici and Christina Fragouli and Athina Markopoulou MicroCast: Cooperative Video Streaming Using Cellular and Local Connections . . 2983--2999 Se-Young Yun and Jinwoo Shin and Yung Yi Distributed Medium Access Over Time-Varying Channels . . . . . . . . . 3000--3013 Theodore Elhourani and Abishek Gopalan and Srinivasan Ramasubramanian and Theodore Elhourani and Abishek Gopalan and Srinivasan Ramasubramanian IP Fast Rerouting for Multi-Link Failures . . . . . . . . . . . . . . . . 3014--3025 Nirmalya Roy and Archan Misra and Sajal K. Das and Christine Julien Determining Quality- and Energy-Aware Multiple Contexts in Pervasive Computing Environments . . . . . . . . . . . . . . 3026--3042 Georgios S. Paschos and Chih-Ping Li and Eytan Modiano and Kostas Choumas and Thanasis Korakis In-Network Congestion Control for Multirate Multicast . . . . . . . . . . 3043--3055 Salim El Rouayheb and Sreechakra Goparaju and Han Mao Kiah and Olgica Milenkovic Synchronization and Deduplication in Coded Distributed Storage Networks . . . 3056--3069 Reaz Ahmed and Faizul Bari and Shihabur Rahman Chowdhury and Golam Rabbani and Raouf Boutaba and Bertrand Mathieu and Reaz Ahmed and Faizul Bari and Shihabur Rahman Chowdhury and Golam Rabbani and Raouf Boutaba and Bertrand Mathieu $ \alpha $Route: Routing on Names . . . 3070--3083 Richard T. B. Ma Usage-Based Pricing and Competition in Congestible Network Service Markets . . 3084--3097 Yuanqing Zheng and Mo Li and Yuanqing Zheng and Mo Li Read Bulk Data From Computational RFIDs 3098--3108 Zhangyu Guan and G. Enrico Santagati and Tommaso Melodia Distributed Algorithms for Joint Channel Access and Rate Control in Ultrasonic Intra-Body Networks . . . . . . . . . . 3109--3122 Lin Chen and Wei Wang and Hua Huang and Shan Lin and Lin Chen and Wei Wang and Hua Huang and Shan Lin On Time-Constrained Data Harvesting in Wireless Sensor Networks: Approximation Algorithm Design . . . . . . . . . . . . 3123--3135 Virag Shah and Gustavo de Veciana and George Kesidis A Stable Approach for Routing Queries in Unstructured P2P Networks . . . . . . . 3136--3147 Lin Chen and Kaigui Bian and Meng Zheng Never Live Without Neighbors: From Single- to Multi-Channel Neighbor Discovery for Mobile Sensing Applications . . . . . . . . . . . . . . 3148--3161 Yi Xie and Yu Wang and Haitao He and Yang Xiang and Shunzheng Yu and Xincheng Liu A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior . . . . . . . . . . . . 3162--3176 Jia Liu and Min Chen and Bin Xiao and Feng Zhu and Shigang Chen and Lijun Chen Efficient RFID Grouping Protocols . . . 3177--3190 DaeHun Nyang and DongOh Shin Recyclable Counter With Confinement for Real-Time Per-Flow Measurement . . . . . 3191--3203 Kundan Kandhway and Joy Kuri Optimal Resource Allocation Over Time and Degree Classes for Maximizing Information Dissemination in Social Networks . . . . . . . . . . . . . . . . 3204--3217 Sara Ayoubi and Yiheng Chen and Chadi Assi Towards Promoting Backup-Sharing in Survivable Virtual Network Design . . . 3218--3231 Huiyuan Zhang and Dung T. Nguyen and Soham Das and Huiling Zhang and My T. Thai Corrections to ``Least Cost Influence Maximization Across Multiple Social Networks'' [Apr 16 929--939] . . . . . . 3232--3232
Wei Wang and Qian Zhang Privacy Preservation for Context Sensing on Smartphone . . . . . . . . . . . . . 3235--3247 Benjamin Baron and Promethee Spathis and Herve Rivano and Marcelo Dias de Amorim Offloading Massive Data Onto Passenger Vehicles: Topology Simplification and Traffic Assignment . . . . . . . . . . . 3248--3261 Yehuda Afek and Anat Bremler-Barr and Yotam Harchol and David Hay and Yaron Koral Making DPI Engines Resilient to Algorithmic Complexity Attacks . . . . . 3262--3275 Xinlei Wang and Amit Pande and Jindan Zhu and Prasant Mohapatra STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users . . . . 3276--3289 Le Zhang and Shahrokh Valaee Congestion Control for Vehicular Networks With Safety-Awareness . . . . . 3290--3299 Wenping Liu and Tianping Deng and Yang and Hongbo Jiang and Xiaofei Liao and Jiangchuan Liu and Bo Li and Guoyin Jiang Towards Robust Surface Skeleton Extraction and Its Applications in $3$D Wireless Sensor Networks . . . . . . . . 3300--3313 Wei Gong and Haoxiang Liu and Xin Miao and Kebin Liu and Wenbo He and Lan Zhang and Yunhao Liu Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems . . . . . . . . 3314--3325 Yan Qiao and Shigang Chen and Zhen Mo and Myungkeun Yoon When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications . . . . . . . . . . 3326--3339 Huazi Zhang and Kairan Sun and Qiuyuan Huang and Yonggang Wen and Dapeng Wu FUN Coding: Design and Analysis . . . . 3340--3353 Pavlos Sermpezis and Thrasyvoulos Spyropoulos Effects of Content Popularity on the Performance of Content-Centric Opportunistic Networking: an Analytical Approach and Applications . . . . . . . 3354--3368 Endadul Hoque and Hyojeong Lee and Rahul Potharaju and Charles Killian and Cristina Nita-Rotaru Automated Adversarial Testing of Unmodified Wireless Routing Implementations . . . . . . . . . . . . 3369--3382 Osman Yagan and Armand M. Makowski Wireless Sensor Networks Under the Random Pairwise Key Predistribution Scheme: Can Resiliency Be Achieved With Small Key Rings? . . . . . . . . . . . . 3383--3396 Dongmyoung Kim and Taejun Park and Seongwon Kim and Hyoil Kim and Sunghyun Choi Load Balancing in Two-Tier Cellular Networks With Open and Hybrid Access Femtocells . . . . . . . . . . . . . . . 3397--3411 Tal Mizrahi and Efi Saat and Yoram Moses Timed Consistent Network Updates in Software-Defined Networks . . . . . . . 3412--3425 Jiliang Wang and Shuo Lian and Wei Dong and Xiang-Yang Li and Yunhao Liu Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement . . . . . . . . . . . 3426--3438 Wenping Liu and Hongbo Jiang and Jiangchuan Liu and Xiaofei Liao and Hongzhi Lin and Tianping Deng On the Distance-Sensitive and Load-Balanced Information Storage and Retrieval for $3$D Sensor Networks . . . 3439--3449 Bong-Hwan Oh and Jaiyong Lee Feedback-Based Path Failure Detection and Buffer Blocking Protection for MPTCP 3450--3461 Joao Luis Sobrinho and Laurent Vanbever and Franck Le and Andre Sousa and Jennifer Rexford Scaling the Internet Routing System Through Distributed Route Aggregation 3462--3476 Muhammad Shahzad and Alex X. Liu Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping . . . . . . . . . . . . . . . . 3477--3492 Gideon Blocq and Ariel Orda How Good is Bargained Routing? . . . . . 3493--3507 Xin Sun and Geoffrey G. Xie An Integrated Systematic Approach to Designing Enterprise Access Control . . 3508--3522 Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Raheem Beyah Structural Data De-Anonymization: Theory and Practice . . . . . . . . . . . . . . 3523--3536 Ming Zhu and Dan Li and Fangxin Wang and Anke Li and K. K. Ramakrishnan and Ying Liu and Jianping Wu and Nan Zhu and Xue Liu CCDN: Content-Centric Data Center Networks . . . . . . . . . . . . . . . . 3537--3550 Saiyu Qi and Yuanqing Zheng and Mo Li and Yunhao Liu and Jinli Qiu Scalable Industry Data Access Control in RFID-Enabled Supply Chain . . . . . . . 3551--3564 Bing Hu and Kwan L. Yeung and Qian Zhou and Chunzhi He On Iterative Scheduling for Input-Queued Switches With a Speedup of $ 2 - 1 / N $ 3565--3577 Emile Archambault and Nabih Alloune and Marija Furdek and Zhenyu Xu and Christine Tremblay and Ajmal Muhammad and Jiajia Chen and Lena Wosinska and Paul Littlewood and Michel P. Belanger Routing and Spectrum Assignment in Elastic Filterless Optical Networks . . 3578--3592 Xu Chen and Xiaowen Gong and Lei Yang and Junshan Zhang Exploiting Social Tie Structure for Cooperative Wireless Networking: a Social Group Utility Maximization Framework . . . . . . . . . . . . . . . 3593--3606 Qing Wang and Domenico Giustiniano Intra-Frame Bidirectional Transmission in Networks of Visible LEDs . . . . . . 3607--3619 Zhao Zhang and James Willson and Zaixin Lu and Weili Wu and Xuding Zhu and Ding-Zhu Du Approximating Maximum Lifetime $k$-Coverage Through Minimizing Weighted $k$-Cover in Homogeneous Wireless Sensor Networks . . . . . . . . . . . . . . . . 3620--3633 Di Wu and Qiang Liu and Yong Li and Julie A. McCann and Amelia C. Regan and Nalini Venkatasubramanian Adaptive Lookup of Open WiFi Using Crowdsensing . . . . . . . . . . . . . . 3634--3647 Long Gong and Huihui Jiang and Yixiang Wang and Zuqing Zhu Novel Location-Constrained Virtual Network Embedding LC-VNE Algorithms Towards Integrated Node and Link Mapping 3648--3661 Simon Oya and Fernando Perez-Gonzalez and Carmela Troncoso Design of Pool Mixes Against Profiling Attacks in Real Conditions . . . . . . . 3662--3675 Long Cheng and Jianwei Niu and Yu Gu and Chengwen Luo and Tian He Achieving Efficient Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks 3676--3689 Valentino Pacifici and Gyorgy Dan Coordinated Selfish Distributed Caching for Peering Content-Centric Networks . . 3690--3701 Agostinho Agra and Amaro de Sousa and Mahdi Doostmohammadi The Minimum Cost Design of Transparent Optical Networks Combining Grooming, Routing, and Wavelength Assignment . . . 3702--3713 Chi-Kin Chau and Majid Khonji and Muhammad Aftab Online Algorithms for Information Aggregation From Distributed and Correlated Sources . . . . . . . . . . . 3714--3725 Victor Berrocal-Plaza and Miguel A. Vega-Rodriguez and Juan M. Sanchez-Perez An Efficient Way of Assigning Paging Areas by Using Mobility Models . . . . . 3726--3739 Zhenhua Li and Zhiyang Guo and Yuanyuan Yang BCCC: an Expandable Network for Data Centers . . . . . . . . . . . . . . . . 3740--3755 Carla-Fabiana Chiasserini and Michele Garetto and Emilio Leonardi Social Network De-Anonymization Under Scale-Free User Relations . . . . . . . 3756--3769 Muhammad Shahzad and Alex X. Liu Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild . . . . . . . . . . . . . . . . 3770--3784 Wan-Seon Lim and Kang G. Shin POEM: Minimizing Energy Consumption for WiFi Tethering Service . . . . . . . . . 3785--3797 Jungseul Ok and Youngmi Jin and Jinwoo Shin and Yung Yi On Maximizing Diffusion Speed Over Social Networks With Strategic Users . . 3798--3811 Maialen Larrnaaga and Urtzi Ayesta and Ina Maria Verloop Dynamic Control of Birth-and-Death Restless Bandits: Application to Resource-Allocation Problems . . . . . . 3812--3825 Varun Gupta and Yigal Bejerano and Craig Gutterman and Jaime Ferragut and Katherine Guo and Thyaga Nandagopal and Gil Zussman Light-Weight Feedback Mechanism for WiFi Multicast to Very Large Groups --- Experimental Evaluation . . . . . . . . 3826--3840 Li Yan and Haiying Shen and Kang Chen TSearch: Target-Oriented Low-Delay Node Searching in DTNs With Social Network Properties . . . . . . . . . . . . . . . 3841--3855 Tiantian Zhu and Hongyu Gao and Yi Yang and Kai Bu and Yan Chen and Doug Downey and Kathy Lee and Alok N. Choudhary Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates . . . . 3856--3869
Jian Li and Rajarshi Bhattacharyya and Suman Paul and Srinivas Shakkottai and Vijay Subramanian Incentivizing Sharing in Realtime D2D Streaming Networks: a Mean Field Game Perspective . . . . . . . . . . . . . . 3--17 Wei Wang and Bei Liu and Donghyun Kim and Deying Li and Jingyi Wang and Wei Gao A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph . . . . . . . . . . . . . . . . . 18--28 Longbo Huang The Value-of-Information in Matching With Queues . . . . . . . . . . . . . . 29--42 Zhuo Lu and Cliff Wang Enabling Network Anti-Inference via Proactive Strategies: a Fundamental Perspective . . . . . . . . . . . . . . 43--55 Joe Kornycky and Omar Abdul-Hameed and Ahmet Kondoz and Brian C. Barber Radio Frequency Traffic Classification Over WLAN . . . . . . . . . . . . . . . 56--68 Zhenjiang Li and Wan Du and Yuanqing Zheng and Mo Li and Dapeng Wu From Rateless to Hopless . . . . . . . . 69--82 Mays F. Al-Naday and Nikolaos Thomos and Martin J. Reed Information-Centric Multilayer Networking: Improving Performance Through an ICN/WDM Architecture . . . . 83--97 Ashwin Pananjady and Vivek Kumar Bagaria and Rahul Vaze Optimally Approximating the Coverage Lifetime of Wireless Sensor Networks . . 98--111 Guangmo Tong and Weili Wu and Shaojie Tang and Ding-Zhu Du Adaptive Influence Maximization in Dynamic Social Networks . . . . . . . . 112--125 Neshat Etemadi Rad and Yariv Ephraim and Brian L. Mark Delay Network Tomography Using a Partially Observable Bivariate Markov Chain . . . . . . . . . . . . . . . . . 126--138 Jose Yallouz and Ariel Orda Tunable QoS-Aware Network Survivability 139--149 Joao Luis Sobrinho Correctness of Routing Vector Protocols as a Property of Network Cycles . . . . 150--163 Sharayu Moharir and Subhashini Krishnasamy and Sanjay Shakkottai Scheduling in Densified Networks: Algorithms and Performance . . . . . . . 164--178 An Liu and Vincent K. N. Lau How Much Cache is Needed to Achieve Linear Capacity Scaling in Backhaul-Limited Dense Wireless Networks? . . . . . . . . . . . . . . . 179--188 Adiseshu Hari and Urs Niesen and Gordon Wilfong On the Problem of Optimal Path Encoding for Software-Defined Networks . . . . . 189--198 Zizhong Cao and Paul Claisse and Rene-Jean Essiambre and Murali Kodialam and T. V. Lakshman Optimizing Throughput in Optical Networks: The Joint Routing and Power Control Problem . . . . . . . . . . . . 199--209 Wei Dong and Yi Gao and Wenbin Wu and Jiajun Bu and Chun Chen and Xiang-Yang Li Optimal Monitor Assignment for Preferential Link Tomography in Communication Networks . . . . . . . . . 210--223 Xiulong Liu and Bin Xiao and Keqiu Li and Alex X. Liu and Jie Wu and Xin Xie and Heng Qi RFID Estimation With Blocker Tags . . . 224--237 Fang Hao and Murali Kodialam and T. V. Lakshman and Sarit Mukherjee Online Allocation of Virtual Machines in a Distributed Cloud . . . . . . . . . . 238--249 Christina Vlachou and Albert Banchs and Julien Herzen and Patrick Thiran How CSMA/CA With Deferral Affects Performance and Dynamics in Power-Line Communications . . . . . . . . . . . . . 250--263 Xiulong Liu and Keqiu Li and Alex X. Liu and Song Guo and Muhammad Shahzad and Ann L. Wang and Jie Wu Multi-Category RFID Estimation . . . . . 264--277 Xiulong Liu and Xin Xie and Keqiu Li and Bin Xiao and Jie Wu and Heng Qi and Dawei Lu Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems 278--291 Jelena Marasevic and Jin Zhou and Harish Krishnaswamy and Yuan Zhong and Gil Zussman Resource Allocation and Rate Gains in Practical Full-Duplex Systems . . . . . 292--305 Rebecca Lovewell and Qianwen Yin and Tianrong Zhang and Jasleen Kaur and Frank Donelson Smith Packet-Scale Congestion Control Paradigm 306--319 Ali Munir and Ghufran Baig and Syed Mohammad Irteza and Ihsan Ayyub Qazi and Alex X. Liu and Fahad Rafique Dogar PASE: Synthesizing Existing Transport Strategies for Near-Optimal Data Center Transport . . . . . . . . . . . . . . . 320--334 Changhyun Lee and Chunjong Park and Keon Jang and Sue Moon and Dongsu Han DX: Latency-Based Congestion Control for Datacenters . . . . . . . . . . . . . . 335--348 Stefano D'Aronco and Laura Toni and Sergio Mena and Xiaoqing Zhu and Pascal Frossard Improved Utility-Based Congestion Control for Delay-Constrained Communication . . . . . . . . . . . . . 349--362 Xiaoyong Li and Daren B. H. Cline and Dmitri Loguinov Temporal Update Dynamics Under Blind Sampling . . . . . . . . . . . . . . . . 363--376 Abhishek Sinha and Georgios Paschos and Chih-Ping Li and Eytan Modiano Throughput-Optimal Multihop Broadcast on Directed Acyclic Wireless Networks . . . 377--391 Qingjun Xiao and Bin Xiao and Shigang Chen and Jiming Chen Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems . . . . 392--405 Alireza Keshavarz-Haddad and Ehsan Aryafar and Michael Wang and Mung Chiang HetNets Selection by Clients: Convergence, Efficiency, and Practicality . . . . . . . . . . . . . . 406--419 V. Sriram Siddhardh Nadendla and Swastik K. Brahma and Pramod K. Varshney Optimal Spectrum Auction Design With $2$-D Truthful Revelations Under Uncertain Spectrum Availability . . . . 420--433 Liang Ma and Ting He and Ananthram Swami and Don Towsley and Kin K. Leung Network Capability in Localizing Node Failures via End-to-End Path Measurements . . . . . . . . . . . . . . 434--450 Yongquan Fu and Xu Xiaoping Self-Stabilized Distributed Network Distance Prediction . . . . . . . . . . 451--464 Wei-Cheng Kuo and Chih-Chun Wang Robust and Optimal Opportunistic Scheduling for Downlink Two-Flow Network Coding With Varying Channel Quality and Rate Adaptation . . . . . . . . . . . . 465--479 Yi Gao and Wei Dong and Chun Chen and Xiaoyu Zhang and Jiajun Bu and Xue Liu Accurate Per-Packet Delay Tomography in Wireless Ad Hoc Networks . . . . . . . . 480--491 Luis Sanabria-Russo and Jaume Barcelo and Boris Bellalta and Francesco Gringoli A High Efficiency MAC Protocol for WLANs: Providing Fairness in Dense Scenarios . . . . . . . . . . . . . . . 492--505 Fangming Liu and Jian Guo and Xiaomeng Huang and John C. S. Lui eBA: Efficient Bandwidth Guarantee Under Traffic Variability in Datacenters . . . 506--519 Hao Zhou and Yusheng Ji and Xiaoyan Wang and Shigeki Yamada eICIC Configuration Algorithm with Service Scalability in Heterogeneous Cellular Networks . . . . . . . . . . . 520--535 Xu Chen and Xiaowen Gong and Lei Yang and Junshan Zhang Amazon in the White Space: Social Recommendation Aided Distributed Spectrum Access . . . . . . . . . . . . 536--549 Fidan Mehmeti and Thrasyvoulos Spyropoulos Performance Modeling, Analysis, and Optimization of Delayed Mobile Data Offloading for Mobile Users . . . . . . 550--564 Wei Koong Chai and George Pavlou Path-Based Epidemic Spreading in Networks . . . . . . . . . . . . . . . . 565--578 Hong Zhang and Kai Chen and Wei Bai and Dongsu Han and Chen Tian and Hao Wang and Haibing Guan and Ming Zhang Guaranteeing Deadlines for Inter-Data Center Transfers . . . . . . . . . . . . 579--595 Longfei Shangguan and Zheng Yang and Alex X. Liu and Zimu Zhou and Yunhao Liu STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization . . . . . . . . . . . . 596--609 Giorgos Vasiliadis and Lazaros Koromilas and Michalis Polychronakis and Sotiris Ioannidis Design and Implementation of a Stateful Network Packet Processing Framework for GPUs . . . . . . . . . . . . . . . . . . 610--623 Xiaohang Li and Chih-Chun Wang and Xiaojun Lin Inter-Session Network Coding Schemes for $1$-to-$2$ Downlink Access-Point Networks With Sequential Hard Deadline Constraints . . . . . . . . . . . . . . 624--638
YoungGyoun Moon and Donghwi Kim and Younghwan Go and Yeongjin Kim and Yung Yi and Song Chong and KyoungSoo Park Cedos: a Network Architecture and Programming Abstraction for Delay-Tolerant Mobile Apps . . . . . . . 646--661 Qiaomin Xie and Mayank Pundir and Yi Lu and Cristina L. Abad and Roy H. Campbell Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality . . . . 662--675 Anh Le and Arash Saber Tehrani and Alexandros Dimakis and Athina Markopoulou Recovery of Packet Losses in Wireless Broadcast for Real-Time Applications . . 676--689 Hamzeh Beyranvand and Martin Levesque and Martin Maier and Jawad A. Salehi and Christos Verikoukis and David Tipper Toward 5G: FiWi Enhanced LTE-A HetNets With Reliable Low-Latency Fiber Backhaul Sharing and WiFi Offloading . . . . . . 690--707 Shaoquan Zhang and Longbo Huang and Minghua Chen and Xin Liu Proactive Serving Decreases User Delay Exponentially: The Light-Tailed Service Time Case . . . . . . . . . . . . . . . 708--723 Rui Zhu and Bang Liu and Di Niu and Zongpeng Li and Hong Vicky Zhao Network Latency Estimation for Personal Devices: a Matrix Completion Approach 724--737 Roland van Rijswijk-Deij and Kaspar Hageman and Anna Sperotto and Aiko Pras The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation . . . 738--750 Luoyi Fu and Xinbing Wang and P. R. Kumar Are We Connected? Optimal Determination of Source--Destination Connectivity in Random Networks . . . . . . . . . . . . 751--764 Benny Van Houdt Explicit Back-Off Rates for Achieving Target Throughputs in CSMA/CA Networks 765--778 Marco Chiesa and Guy Kindler and Michael Schapira Traffic Engineering With Equal-Cost-MultiPath: an Algorithmic Perspective . . . . . . . . . . . . . . 779--792 Ruiting Zhou and Zongpeng Li and Chuan Wu and Zhiyi Huang An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines . . . 793--805 Fangfang Yan and Tony T. Lee and Weisheng Hu Congestion-Aware Embedding of Heterogeneous Bandwidth Virtual Data Centers With Hose Model Abstraction . . 806--819 Wan Du and Jansen Christian Liando and Huanle Zhang and Mo Li Pando: Fountain-Enabled Fast Data Dissemination With Constructive Interference . . . . . . . . . . . . . . 820--833 Ronghui Hou and Yu Cheng and Jiandong Li and Min Sheng and King-Shan Lui Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior 834--848 Tal Mizrahi and Ori Rottenstreich and Yoram Moses TimeFlip: Using Timestamp-Based TCAM Ranges to Accurately Schedule Network Updates . . . . . . . . . . . . . . . . 849--863 Ori Rottenstreich and Janos Tapolcai Optimal Rule Caching and Lossy Compression for Longest Prefix Matching 864--878 Tong Ye and Jinghui Zhang and Tony T. Lee and Weisheng Hu Deflection-Compensated Birkhoff--von-Neumann Switches . . . . . 879--895 Liansheng Tan and Shengda Tang Energy Harvesting Wireless Sensor Node With Temporal Death: Novel Models and Analyses . . . . . . . . . . . . . . . . 896--909 Shailendra Singh and Karthikeyan Sundaresan and Srikanth V. Krishnamurthy and Xinyu Zhang and Mohammad Ali Amir Khojastepour and Sampath Rangarajan TRINITY: Tailoring Wireless Transmission Strategies to User Profiles in Enterprise Wireless Networks . . . . . . 910--924 Yishuo Shi and Zhao Zhang and Yuchang Mo and Ding-Zhu Du Approximation Algorithm for Minimum Weight Fault-Tolerant Virtual Backbone in Unit Disk Graphs . . . . . . . . . . 925--933 Jie Cheng and Yaning Liu and Qiang Ye and Hongwei Du and Athanasios V. Vasilakos DISCS: a Distributed Coordinate System Based on Robust Nonnegative Matrix Completion . . . . . . . . . . . . . . . 934--947 Zhiwei Zhao and Wei Dong and Jiajun Bu and Tao Gu and Geyong Min Accurate and Generic Sender Selection for Bulk Data Dissemination in Low-Power Wireless Networks . . . . . . . . . . . 948--959 G. Enrico Santagati and Tommaso Melodia A Software-Defined Ultrasonic Networking Framework for Wearable Devices . . . . . 960--973 Amitava Datta Construction of Polynomial-Size Optical Priority Queues Using Linear Switches and Fiber Delay Lines . . . . . . . . . 974--987 Tuan Dao and Amit K. Roy-Chowdhury and Harsha V. Madhyastha and Srikanth V. Krishnamurthy and Tom La Porta Managing Redundant Content in Bandwidth Constrained Wireless Networks . . . . . 988--1003 Lorenzo Ferrari and Anna Scaglione and Reinhard Gentz and Yao-Win Peter Hong Convergence Results on Pulse Coupled Oscillator Protocols in Locally Connected Networks . . . . . . . . . . . 1004--1019 Santosh Chavan and Nizar Malangadan and Gaurav Raina TCP With Virtual Queue Management Policies: Stability and Bifurcation Analysis . . . . . . . . . . . . . . . . 1020--1033 Xiaoxi Zhang and Zhiyi Huang and Chuan Wu and Zongpeng Li and Francis C. M. Lau Online Auctions in IaaS Clouds: Welfare and Profit Maximization With Server Costs . . . . . . . . . . . . . . . . . 1034--1047 Serdar Vural and Ning Wang and Pirabakaran Navaratnam and Rahim Tafazolli Caching Transient Data in Internet Content Routers . . . . . . . . . . . . 1048--1061 Kianoosh Mokhtarian and Hans-Arno Jacobsen Flexible Caching Algorithms for Video Content Distribution Networks . . . . . 1062--1075 Bahar Partov and Douglas J. Leith Utility Fair Rate Allocation in LTE/802.11 Networks . . . . . . . . . . 1076--1088 Daniel Posch and Benjamin Rainer and Hermann Hellwagner SAF: Stochastic Adaptive Forwarding in Named Data Networking . . . . . . . . . 1089--1102 Jingjing Luo and Jinbei Zhang and Ying Cui and Li Yu and Xinbing Wang Asymptotic Analysis on Content Placement and Retrieval in MANETs . . . . . . . . 1103--1118 Alvaro Fernandez and Norvald Stol Economic, Dissatisfaction, and Reputation Risks of Hardware and Software Failures in PONs . . . . . . . 1119--1132 Marco Chiesa and Ilya Nikolaevskiy and Slobodan Mitrovic and Andrei Gurtov and Aleksander Madry and Michael Schapira and Scott Shenker On the Resiliency of Static Forwarding Tables . . . . . . . . . . . . . . . . . 1133--1146 Fengli Xu and Yong Li and Huandong Wang and Pengyu Zhang and Depeng Jin Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment . . . . . . . . . . . . . . 1147--1161 Omid Javidbakht and Parv Venkitasubramaniam Delay Anonymity Tradeoff in Mix Networks: Optimal Routing . . . . . . . 1162--1175 Kang Chen and Haiying Shen FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control . . . 1176--1189 Lailong Luo and Deke Guo and Jie Wu and Ori Rottenstreich and Qian He and Yudong Qin and Xueshan Luo Efficient Multiset Synchronization . . . 1190--1205 Moreno Ambrosin and Mauro Conti and Fabio De Gaspari and Radha Poovendran LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking . . . . . . . . . . . . . . . 1206--1219 Zuqing Zhu and Xiahe Liu and Yixiang Wang and Wei Lu and Long Gong and Shui Yu and Nirwan Ansari Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks . . . . . . . . 1220--1234 Huichen Dai and Jianyuan Lu and Yi Wang and Tian Pan and Bin Liu BFAST: High-Speed and Memory-Efficient Approach for NDN Forwarding Engine . . . 1235--1248 Min Chen and Shigang Chen and Zhiping Cai Counter Tree: a Scalable Counter Architecture for Per-Flow Traffic Measurement . . . . . . . . . . . . . . 1249--1262 Brigitte Jaumard and Maryam Daryalal Efficient Spectrum Utilization in Large Scale RWA Problems . . . . . . . . . . . 1263--1278 Kangwook Lee and Ramtin Pedarsani and Kannan Ramchandran On Scheduling Redundant Requests With Cancellation Overheads . . . . . . . . . 1279--1290
Niv Voskoboynik and Haim H. Permuter and Asaf Cohen Network Coding Schemes for Data Exchange Networks With Arbitrary Transmission Delays . . . . . . . . . . . . . . . . . 1293--1309 Salvatore D'Oro and Eylem Ekici and Sergio Palazzo Optimal Power Allocation and Scheduling Under Jamming Attacks . . . . . . . . . 1310--1323 Runtian Ren and Xueyan Tang and Yusen Li and Wentong Cai Competitiveness of Dynamic Bin Packing for Online Cloud Server Allocation . . . 1324--1331 Ori Rottenstreich and Mario Di Francesco and Yoram Revah Perfectly Periodic Scheduling of Collective Data Streams . . . . . . . . 1332--1346 Wei Gong and Jiangchuan Liu and Kebin Liu and Yunhao Liu Toward More Rigorous and Practical Cardinality Estimation for Large-Scale RFID Systems . . . . . . . . . . . . . . 1347--1358 George Iosifidis and Iordanis Koutsopoulos and Georgios Smaragdakis Distributed Storage Control Algorithms for Dynamic Networks . . . . . . . . . . 1359--1372 Hassan Habibi Gharakheili and Vijay Sivaraman and Tim Moors and Arun Vishwanath and John Matthews and Craig Russell Enabling Fast and Slow Lanes for Content Providers Using Software Defined Networking . . . . . . . . . . . . . . . 1373--1385 George Iosifidis and Lin Gao and Jianwei Huang and Leandros Tassiulas Efficient and Fair Collaborative Mobile Internet Access . . . . . . . . . . . . 1386--1400 Shu Wang and Vignesh Venkateswaran and Xinyu Zhang Fundamental Analysis of Full-Duplex Gains in Wireless Networks . . . . . . . 1401--1416 Paolo Di Francesco and Jacek Kibilda and Francesco Malandrino and Nicholas J. Kaminski and Luiz A. DaSilva Sensitivity Analysis on Service-Driven Network Planning . . . . . . . . . . . . 1417--1430 Zizhong Cao and Shivendra S. Panwar and Murali Kodialam and T. V. Lakshman Enhancing Mobile Networks With Software Defined Networking and Cloud Computing 1431--1444 You-Chiun Wang and Tzung-Yu Tsai A Pricing-Aware Resource Scheduling Framework for LTE Networks . . . . . . . 1445--1458 Tuan A. Dao and Indrajeet Singh and Harsha V. Madhyastha and Srikanth V. Krishnamurthy and Guohong Cao and Prasant Mohapatra TIDE: a User-Centric Tool for Identifying Energy Hungry Applications on Smartphones . . . . . . . . . . . . . 1459--1474 Min Chen and Shigang Chen and Yuguang Fang Lightweight Anonymous Authentication Protocols for RFID Systems . . . . . . . 1475--1488 Faycal Ait Aoudia and Matthieu Gautier and Michele Magno and Olivier Berder and Luca Benini A Generic Framework for Modeling MAC Protocols in Wireless Sensor Networks 1489--1500 Sukanya Bhowmik and Muhammad Adnan Tariq and Boris Koldehofe and Frank Durr and Thomas Kohler and Kurt Rothermel High Performance Publish\slash Subscribe Middleware in Software-Defined Networks 1501--1516 Amir Houmansadr and Wenxuan Zhou and Matthew Caesar and Nikita Borisov SWEET: Serving the Web by Exploiting Email Tunnels . . . . . . . . . . . . . 1517--1527 Wenzhuo Ouyang and Jingwen Bai and Ashutosh Sabharwal Leveraging One-Hop Information in Massive MIMO Full-Duplex Wireless Systems . . . . . . . . . . . . . . . . 1528--1539 Nikolaos Papanikos and Evangelos Papapetrou Deterministic Broadcasting and Random Linear Network Coding in Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . 1540--1554 Chang-Heng Wang and Tara Javidi Adaptive Policies for Scheduling With Reconfiguration Delay: an End-to-End Solution for All-Optical Data Centers 1555--1568 Jiajue Ou and Mo Li and Yuanqing Zheng Come and Be Served: Parallel Decoding for COTS RFID Tags . . . . . . . . . . . 1569--1581 Paul Tune and Matthew Roughan Controlled Synthesis of Traffic Matrices 1582--1592 Eva Papadogiannaki and Lazaros Koromilas and Giorgos Vasiliadis and Sotiris Ioannidis Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures . . . . . . . . . . . . . 1593--1606 Min Chen and Shigang Chen and You Zhou and Youlin Zhang Identifying State-Free Networked Tags 1607--1620 Bhushan Kotnis and Albert Sunny and Joy Kuri Incentivized Campaigning in Social Networks . . . . . . . . . . . . . . . . 1621--1634 Mostafa Dehghan and Bo Jiang and Anand Seetharam and Ting He and Theodoros Salonidis and Jim Kurose and Don Towsley and Ramesh Sitaraman On the Complexity of Optimal Request Routing and Content Caching in Heterogeneous Cache Networks . . . . . . 1635--1648 Stefano Vissicchio and Laurent Vanbever and Luca Cittadini and Geoffrey G. Xie and Olivier Bonaventure Safe Update of Hybrid SDN Networks . . . 1649--1662 Wei Wang and Yingjie Chen and Lu Wang and Qian Zhang Sampleless Wi-Fi: Bringing Low Power to Wi-Fi Communications . . . . . . . . . . 1663--1672 Zhili Zhou and Tachun Lin and Krishnaiyan Thulasiraman and Guoliang Xue Novel Survivable Logical Topology Routing by Logical Protecting Spanning Trees in IP-Over-WDM Networks . . . . . 1673--1685 Fan Wu and Dongxin Liu and Zhihao Wu and Yuan Zhang and Guihai Chen Cost-Efficient Indoor White Space Exploration Through Compressive Sensing 1686--1702 Xiaowen Gong and Xu Chen and Kai Xing and Dong-Hoon Shin and Mengyuan Zhang and Junshan Zhang From Social Group Utility Maximization to Personalized Location Privacy in Mobile Networks . . . . . . . . . . . . 1703--1716 Seydou Ba and Bijoy Chand Chatterjee and Eiji Oki Defragmentation Scheme Based on Exchanging Primary and Backup Paths in $ 1 + 1 $ Path Protected Elastic Optical Networks . . . . . . . . . . . . . . . . 1717--1731 Ting He and Athanasios Gkelias and Liang Ma and Kin K. Leung and Ananthram Swami and Don Towsley Robust and Efficient Monitor Placement for Network Tomography in Dynamic Networks . . . . . . . . . . . . . . . . 1732--1745 Yong Cui and Jian Song and Kui Ren and Minming Li and Zongpeng Li and Qingmei Ren and Yangjun Zhang Software Defined Cooperative Offloading for Mobile Cloudlets . . . . . . . . . . 1746--1760 Chuchu Wu and Mario Gerla and Mihaela van der Schaar Social Norm Incentives for Network Coding in Manets . . . . . . . . . . . . 1761--1774 Matthew Johnston and Eytan Modiano Controller Placement in Wireless Networks With Delayed CSI . . . . . . . 1775--1788 Jun Zhao Topological Properties of Secure Wireless Sensor Networks Under the $q$-Composite Key Predistribution Scheme With Unreliable Links . . . . . . . . . 1789--1802 Tuo Shi and Siyao Cheng and Zhipeng Cai and Yingshu Li and Jianzhong Li Exploring Connected Dominating Sets in Energy Harvest Networks . . . . . . . . 1803--1817 Alberto Ceselli and Marco Premoli and Stefano Secci Mobile Edge Cloud Network Design Optimization . . . . . . . . . . . . . . 1818--1831 Xueqing Huang and Tao Han and Nirwan Ansari Smart Grid Enabled Mobile Networks: Jointly Optimizing BS Operation and Power Distribution . . . . . . . . . . . 1832--1845 Nanxi Kang and Ori Rottenstreich and Sanjay G. Rao and Jennifer Rexford Alpaca: Compact Network Policies With Attribute-Encoded Addresses . . . . . . 1846--1860 Hongli Xu and Xiang-Yang Li and Liusheng Huang and Hou Deng and He Huang and Haibo Wang Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN 1861--1875 Shiva Raj Pokhrel and Manoj Panda and Hai L. Vu Analytical Modeling of Multipath TCP Over Last-Mile Wireless . . . . . . . . 1876--1891 Mao Ge and Tong Ye and Tony T. Lee and Weisheng Hu Multicast Routing and Wavelength Assignment in AWG-Based Clos Networks 1892--1909 Kate Ching-Ju Lin and Wei-Liang Shen and Ming-Syan Chen and Kun Tan User-Centric Network MIMO With Dynamic Clustering . . . . . . . . . . . . . . . 1910--1923 Luca Chiaraviglio and Lavinia Amorosi and Paolo DellOlmo and William Liu and Jairo A. Gutierrez and Antonio Cianfrani and Marco Polverini and Esther Le Rouzic and Marco Listanti Lifetime-Aware ISP Networks: Optimal Formulation and Solutions . . . . . . . 1924--1937
Guo Chen and Youjian Zhao and Hailiang Xu and Dan Pei and Dan Li $ {\rm F}^2 $ Tree: Rapid Failure Recovery for Routing in Production Data Center Networks . . . . . . . . . . . . 1940--1953 Wei Bai and Li Chen and Kai Chen and Dongsu Han and Chen Tian and Hao Wang PIAS: Practical Information-Agnostic Flow Scheduling for Commodity Data Centers . . . . . . . . . . . . . . . . 1954--1967 Peruru Subrahmanya Swamy and Radha Krishna Ganti and Krishna Jagannathan Adaptive CSMA Under the SINR Model: Efficient Approximation Algorithms for Throughput and Utility Maximization . . 1968--1981 Lin Chen and Yong Li and Athanasios V. Vasilakos On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design . . . . 1982--1993 Liqiong Chang and Xiaojiang Chen and Yu Wang and Dingyi Fang and Ju Wang and Tianzhang Xing and Zhanyong Tang FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas . . . . . . . 1994--2007 Vincenzo Eramo and Emanuele Miucci and Mostafa Ammar and Francesco Giacinto Lavacca An Approach for Service Function Chain Routing and Virtual Function Network Instance Migration in Network Function Virtualization Architectures . . . . . . 2008--2025 Yuben Qu and Chao Dong and Haipeng Dai and Fan Wu and Shaojie Tang and Hai Wang and Chang Tian Multicast in Multihop CRNs Under Uncertain Spectrum Availability: a Network Coding Approach . . . . . . . . 2026--2039 Yiming Zhang and Dongsheng Li and Chuanxiong Guo and Haitao Wu and Yongqiang Xiong and Xicheng Lu CubicRing: Exploiting Network Proximity for Distributed In-Memory Key-Value Store . . . . . . . . . . . . . . . . . 2040--2053 Massimo Monti and Manolis Sifalakis and Christian F. Tschudin and Marco Luise On Hardware Programmable Network Dynamics With a Chemistry-Inspired Abstraction . . . . . . . . . . . . . . 2054--2067 Mohammad Hassan Lotfi and Karthikeyan Sundaresan and Saswati Sarkar and Mohammad Ali Khojastepour Economics of Quality Sponsored Data in Non-Neutral Networks . . . . . . . . . . 2068--2081 Bo Cheng and Ming Wang and Shuai Zhao and Zhongyi Zhai and Da Zhu and Junliang Chen Situation-Aware Dynamic Service Coordination in an IoT Environment . . . 2082--2095 Daibo Liu and Zhichao Cao and Yi Zhang and Mengshu Hou Achieving Accurate and Real-Time Link Estimation for Low Power Wireless Sensor Networks . . . . . . . . . . . . . . . . 2096--2109 Haoran Yu and Man Hon Cheung and Lin Gao and Jianwei Huang Public Wi-Fi Monetization via Advertising . . . . . . . . . . . . . . 2110--2121 Kyuyong Shin and Carlee Joe-Wong and Sangtae Ha and Yung Yi and Injong Rhee and Douglas S. Reeves T-Chain: a General Incentive Scheme for Cooperative Computing . . . . . . . . . 2122--2137 Dongxiao Yu and Li Ning and Yifei Zou and Jiguo Yu and Xiuzhen Cheng and Francis C. M. Lau Distributed Spanner Construction With Physical Interference: Constant Stretch and Linear Sparseness . . . . . . . . . 2138--2151 Romain Fontugne and Patrice Abry and Kensuke Fukuda and Darryl Veitch and Kenjiro Cho and Pierre Borgnat and Herwig Wendt Scaling in Internet Traffic: a 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections . . . . . . . . . . . . . . 2152--2165 Yang Liu and Mingyan Liu An Online Learning Approach to Improving the Quality of Crowd-Sourcing . . . . . 2166--2179 Xiaohan Wei and Michael J. Neely Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems . . . . . . . . 2180--2194 Li and Ke Xu and Dan Wang and Chunyi Peng and Kai Zheng and Rashid Mijumbi and Qingyang Xiao A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails . . . . . 2195--2208 Jianan Zhang and Eytan Modiano and David Hay Enhancing Network Robustness via Shielding . . . . . . . . . . . . . . . 2209--2222 Xiaofeng Gao and Xudong Zhu and Jun Li and Fan Wu and Guihai Chen and Ding-Zhu Du and Shaojie Tang A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks . . . . . . . . . . . . . . . . 2223--2234 Novella Bartolini and Stefano Ciavarella and Thomas F. La Porta and Simone Silvestri On Critical Service Recovery After Massive Network Failures . . . . . . . . 2235--2249 Guiyuan Jiang and Siew-Kei Lam and Yidan Sun and Lijia Tu and Jigang Wu Joint Charging Tour Planning and Depot Positioning for Wireless Sensor Networks Using Mobile Chargers . . . . . . . . . 2250--2266 Fei Gu and Jianwei Niu and Lingjie Duan WAIPO: a Fusion-Based Collaborative Indoor Localization System on Smartphones . . . . . . . . . . . . . . 2267--2280 Kai Chen and Xitao Wen and Xingyu Ma and Yan Chen and Yong Xia and Chengchen Hu and Qunfeng Dong and Yongqiang Liu Toward A Scalable, Fault-Tolerant, High-Performance Optical Data Center Architecture . . . . . . . . . . . . . . 2281--2294 Gil Einziger and Roy Friedman TinySet --- An Access Efficient Self Adjusting Bloom Filter Construction . . 2295--2307 Peter Babarczi and Janos Tapolcai and Alija Pasic and Lajos Ronyai and Erika R. Berczi-Kovacs and Muriel Medard Diversity Coding in Two-Connected Networks . . . . . . . . . . . . . . . . 2308--2319 Chao Wu and Xu Chen and Wenwu Zhu and Yaoxue Zhang Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks . . . . . . . . . . . . . . . . 2320--2333 Rui Li and Alex X. Liu and Sheng Xiao and Hongyue Xu and Bezawada Bruhadeshwar and Ann L. Wang Privacy and Integrity Preserving Top-$k$ Query Processing for Two-Tiered Sensor Networks . . . . . . . . . . . . . . . . 2334--2346 Xitao Wen and Kai Bu and Bo Yang and Yan Chen and Li Erran Li and Xiaolin Chen and Jianfeng Yang and Xue Leng RuleScope: Inspecting Forwarding Faults for Software-Defined Networking . . . . 2347--2360 Weng Chon Ao and Konstantinos Psounis Approximation Algorithms for Online User Association in Multi-Tier Multi-Cell Mobile Networks . . . . . . . . . . . . 2361--2374 Jinbei Zhang and Luoyi Fu and Qi Wang and Liang Liu and Xinyu Wang and Xinbing Wang Connectivity Analysis in Wireless Networks With Correlated Mobility and Cluster Scalability . . . . . . . . . . 2375--2390 Haitao Wu and Fen Zhou and Zuqing Zhu and Yaojun Chen On the Distance Spectrum Assignment in Elastic Optical Networks . . . . . . . . 2391--2404 Zimu Zhou and Longfei Shangguan and Xiaolong Zheng and Lei Yang and Yunhao Liu Design and Implementation of an RFID-Based Customer Shopping Behavior Mining System . . . . . . . . . . . . . 2405--2418 Hung T. Nguyen and My T. Thai and Thang N. Dinh A Billion-Scale Approximation Algorithm for Maximizing Benefit in Viral Marketing . . . . . . . . . . . . . . . 2419--2429 Zain Shamsi and Dmitri Loguinov Unsupervised Clustering Under Temporal Feature Volatility in Network Stack Fingerprinting . . . . . . . . . . . . . 2430--2443 Pooja Vyavahare and Nutan Limaye and Ajit A. Diwan and D. Manjunath On the Maximum Rate of Networked Computation in a Capacitated Network . . 2444--2458 Xiujuan Zhang and Jiguo Yu and Wei Li and Xiuzhen Cheng and Dongxiao Yu and Feng Zhao Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR . . . . . . . . . . 2459--2472 Haifeng Zhou and Chunming Wu and Qiumei Cheng and Qianjun Liu SDN--LIRU: a Lossless and Seamless Method for SDN Inter-Domain Route Updates . . . . . . . . . . . . . . . . 2473--2483 Richard J. La Effects of Degree Correlations in Interdependent Security: Good or Bad? 2484--2497 Guoxin Liu and Haiying Shen Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers . . . . 2498--2513 Maurizio Rea and Aymen Fakhreddine and Domenico Giustiniano and Vincent Lenders Filtering Noisy 802.11 Time-of-Flight Ranging Measurements From Commoditized WiFi Radios . . . . . . . . . . . . . . 2514--2527 Wei Gong and Jiangchuan Liu and Zhe Yang Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels . . . . . . . . . . . . . . . . 2528--2539 Shih-Chun Lin and Pu Wang and Ian F. Akyildiz and Min Luo Delay-Based Maximum Power-Weight Scheduling With Heavy-Tailed Traffic . . 2540--2555 Lei Jiao and Antonia Maria Tulino and Jaime Llorca and Yue Jin and Alessandra Sala Smoothed Online Resource Allocation in Multi-Tier Distributed Cloud Networks 2556--2570 Shay Vargaftik and Isaac Keslassy and Ariel Orda No Packet Left Behind: Avoiding Starvation in Dynamic Topologies . . . . 2571--2584
Xiulong Liu and Keqiu Li and Song Guo and Alex X. Liu and Peng Li and Kun Wang and Jie Wu and Xiulong Liu and Keqiu Li and Song Guo and Alex X. Liu and Peng Li and Kun Wang and Jie Wu Top-$k$ Queries for Categorized RFID Systems . . . . . . . . . . . . . . . . 2587--2600 Fulvio Valenza and Cataldo Basile and Daniele Canavese and Antonio Lioy and Fulvio Valenza and Cataldo Basile and Daniele Canavese and Antonio Lioy Classification and Analysis of Communication Protection Policy Anomalies . . . . . . . . . . . . . . . 2601--2614 Nathaniel M. Jones and Georgios S. Paschos and Brooke Shrader and Eytan Modiano and Nathaniel M. Jones and Georgios S. Paschos and Brooke Shrader and Eytan Modiano An Overlay Architecture for Throughput Optimal Multipath Routing . . . . . . . 2615--2628 Gaetano Carlucci and Luca De Cicco and Stefan Holmer and Saverio Mascolo Congestion Control for Web Real-Time Communication . . . . . . . . . . . . . 2629--2642 Songze Li and Qian Yu and Mohammad Ali Maddah-Ali and A. Salman Avestimehr and Songze Li and Qian Yu and Mohammad Ali Maddah-Ali and A. Salman Avestimehr A Scalable Framework for Wireless Distributed Computing . . . . . . . . . 2643--2654 Yuanqing Zheng and Guobin Shen and Liqun Li and Chunshui Zhao and Mo Li and Feng Zhao and Yuanqing Zheng and Guobin Shen and Liqun Li and Chunshui Zhao and Mo Li and Feng Zhao Travi-Navi: Self-Deployable Indoor Navigation System . . . . . . . . . . . 2655--2669 Qingjun Xiao and Shigang Chen and Min Chen and Yian Zhou and Zhiping Cai and Junzhou Luo and Qingjun Xiao and Shigang Chen and Min Chen and Yian Zhou and Zhiping Cai and Junzhou Luo Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System . . . . . . . . 2670--2685 Liang Wang and Gareth Tyson and Jussi Kangasharju and Jon Crowcroft and Liang Wang and Gareth Tyson and Jussi Kangasharju and Jon Crowcroft Milking the Cache Cow With Fairness in Mind . . . . . . . . . . . . . . . . . . 2686--2700 Jiyan Wu and Bo Cheng and Ming Wang and Junliang Chen and Jiyan Wu and Bo Cheng and Ming Wang and Junliang Chen Quality-Aware Energy Optimization in Wireless Video Communication With Multipath TCP . . . . . . . . . . . . . 2701--2718 Qi Li and Patrick P. C. Lee and Peng Zhang and Purui Su and Liang He and Kui Ren and Qi Li and Patrick P. C. Lee and Peng Zhang and Purui Su and Liang He and Kui Ren Capability-Based Security Enforcement in Named Data Networking . . . . . . . . . 2719--2730 Renan Fischer e Silva and Paul M. Carpenter Energy Efficient Ethernet on MapReduce Clusters: Packet Coalescing To Improve 10GbE Links . . . . . . . . . . . . . . 2731--2742 Costas A. Courcoubetis and Antonis Dimakis and Michalis Kanakakis and Costas A. Courcoubetis and Antonis Dimakis and Michalis Kanakakis Congestion Control for Background Data Transfers With Minimal Delay Impact . . 2743--2758 Yossi Kanizo and Ori Rottenstreich and Itai Segall and Jose Yallouz and Yossi Kanizo and Ori Rottenstreich and Itai Segall and Jose Yallouz Optimizing Virtual Backup Allocation for Middleboxes . . . . . . . . . . . . . . 2759--2772 Xiaodan Pan and Tong Ye and Tony T. Lee and Weisheng Hu and Xiaodan Pan and Tong Ye and Tony T. Lee and Weisheng Hu Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol . . . . . . . . . . . . . . . . 2773--2787 Tao Wang and Fangming Liu and Hong Xu and Tao Wang and Fangming Liu and Hong Xu An Efficient Online Algorithm for Dynamic SDN Controller Assignment in Data Center Networks . . . . . . . . . . 2788--2801 Rami Cohen and Yuval Cassuto and Rami Cohen and Yuval Cassuto Coding for Improved Throughput Performance in Network Switches . . . . 2802--2814 Jesus Gomez-Vilardebo and Jesus Gomez-Vilardebo Routing in Accumulative Multi-Hop Networks . . . . . . . . . . . . . . . . 2815--2828 Xiaomei Zhang and Guohong Cao and Xiaomei Zhang and Guohong Cao Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks . . . . . . . . . . . 2829--2843 Sharan Naribole and Edward Knightly and Sharan Naribole and Edward Knightly Scalable Multicast in Highly-Directional $ 60$-GHz WLANs . . . . . . . . . . . . 2844--2857 Mehdi Nikkhah and Aman Mangal and Constantine Dovrolis and Roch Guerin and Mehdi Nikkhah and Aman Mangal and Constantine Dovrolis and Roch Guerin A Statistical Exploration of Protocol Adoption . . . . . . . . . . . . . . . . 2858--2871 Zhichao Cao and Daibo Liu and Jiliang Wang and Xiaolong Zheng Chase: Taming Concurrent Broadcast for Flooding in Asynchronous Duty Cycle Networks . . . . . . . . . . . . . . . . 2872--2885 Huazhe Wang and Chen Qian and Ye Yu and Hongkun Yang and Simon S. Lam and Huazhe Wang and Chen Qian and Ye Yu and Hongkun Yang and Simon S. Lam Practical Network-Wide Packet Behavior Identification by AP Classifier . . . . 2886--2899 Hongkun Yang and Simon S. Lam and Hongkun Yang and Simon S. Lam Scalable Verification of Networks With Packet Transformers Using Atomic Predicates . . . . . . . . . . . . . . . 2900--2915 Zhenghao Zhang and Zhenghao Zhang Analog Bloom Filter and Contention-Free Multi-Bit Simultaneous Query for Centralized Wireless Networks . . . . . 2916--2929 Arash Asadi and Vincenzo Mancuso and Rohit Gupta and Arash Asadi and Vincenzo Mancuso and Rohit Gupta DORE: an Experimental Framework to Enable Outband D$2$D Relay in Cellular Networks . . . . . . . . . . . . . . . . 2930--2943 Tie Qiu and Aoyang Zhao and Feng Xia and Weisheng Si and Dapeng Oliver Wu and Tie Qiu and Aoyang Zhao and Feng Xia and Weisheng Si and Dapeng Oliver Wu ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks . . . . . . . . 2944--2959 Longbo Huang and Longbo Huang Intelligence of Smart Systems: Model, Bounds, and Algorithms . . . . . . . . . 2960--2973 Song Min Kim and Shigemi Ishida and Shuai Wang and Tian He and Song Min Kim and Shigemi Ishida and Shuai Wang and Tian He Free Side-Channel Cross-Technology Communication in Wireless Networks . . . 2974--2987 Anurag Rai and Chih-ping Li and Georgios Paschos and Eytan Modiano and Anurag Rai and Chih-ping Li and Georgios Paschos and Eytan Modiano Loop-Free Backpressure Routing Using Link-Reversal Algorithms . . . . . . . . 2988--3002 Michael Brown and Colin Marshall and Dejun Yang and Ming Li and Jian Lin and Guoliang Xue and Michael Brown and Colin Marshall and Dejun Yang and Ming Li and Jian Lin and Guoliang Xue Maximizing Capacity in Cognitive Radio Networks Under Physical Interference Model . . . . . . . . . . . . . . . . . 3003--3015 Yongquan Fu and Ernst Biersack and Yongquan Fu and Ernst Biersack MCR: Structure-Aware Overlay-Based Latency-Optimal Greedy Relay Search . . 3016--3029 Milad Mahdian and Edmund M. Yeh and Milad Mahdian and Edmund M. Yeh Throughput and Delay Scaling of Content-Centric Ad Hoc and Heterogeneous Wireless Networks . . . . . . . . . . . 3030--3043 Pablo Caballero and Albert Banchs and Gustavo de Veciana and Xavier Costa-Perez and Pablo Caballero and Albert Banchs and Gustavo de Veciana and Xavier Costa-Perez Multi-Tenant Radio Access Network Slicing: Statistical Multiplexing of Spatial Loads . . . . . . . . . . . . . 3044--3058 Aziz Mohaisen and Kui Ren and Aziz Mohaisen and Kui Ren Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures . . . . . . . . . . . . 3059--3072 Hongli Xu and Zhuolong Yu and Xiang-Yang Li and Liusheng Huang and Chen Qian and Taeho Jung and Hongli Xu and Zhuolong Yu and Xiang-Yang Li and Liusheng Huang and Chen Qian and Taeho Jung Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs . . . . . . . . . . . . . . . . . . 3073--3087 Abhishek Sinha and Georgios Paschos and Eytan Modiano and Abhishek Sinha and Georgios Paschos and Eytan Modiano Throughput-Optimal Multi-Hop Broadcast Algorithms . . . . . . . . . . . . . . . 3088--3101 Stefano Vissicchio and Luca Cittadini and Stefano Vissicchio and Luca Cittadini Safe, Efficient, and Robust SDN Updates by Combining Rule Replacements and Additions . . . . . . . . . . . . . . . 3102--3115 Tong Yang and Alex X. Liu and Muhammad Shahzad and Dongsheng Yang and Qiaobin Fu and Gaogang Xie and Xiaoming Li and Tong Yang and Alex X. Liu and Muhammad Shahzad and Dongsheng Yang and Qiaobin Fu and Gaogang Xie and Xiaoming Li A Shifting Framework for Set Queries . . 3116--3131 Song Min Kim and Shuai Wang and Tian He and Song Min Kim and Shuai Wang and Tian He Exploiting Spatiotemporal Correlation for Wireless Networks Under Interference 3132--3145 Antonio Cianfrani and Marco Listanti and Marco Polverini and Antonio Cianfrani and Marco Listanti and Marco Polverini Incremental Deployment of Segment Routing Into an ISP Network: a Traffic Engineering Perspective . . . . . . . . 3146--3160 Weifa Liang and Zichuan Xu and Wenzheng Xu and Jiugen Shi and Guoqiang Mao and Sajal K. Das Approximation Algorithms for Charging Reward Maximization in Rechargeable Sensor Networks via a Mobile Charger . . 3161--3174 Peng Wang and Hong Xu and Zhixiong Niu and Dongsu Han and Yongqiang Xiong and Peng Wang and Hong Xu and Zhixiong Niu and Dongsu Han and Yongqiang Xiong Expeditus: Congestion-Aware Load Balancing in Clos Data Center Networks 3175--3188 Chiara Buratti and Roberto Verdone and Chiara Buratti and Roberto Verdone End-to-End Throughput of Ad Hoc Multi-Hop Networks in a Poisson Field of Interferers . . . . . . . . . . . . . . 3189--3202 Kensuke Fukuda and John Heidemann and Abdul Qadeer and Kensuke Fukuda and John Heidemann and Abdul Qadeer Detecting Malicious Activity With DNS Backscatter Over Time . . . . . . . . . 3203--3218 Hoang Dau and Olgica Milenkovic and Hoang Dau and Olgica Milenkovic Latent Network Features and Overlapping Community Discovery via Boolean Intersection Representations . . . . . . 3219--3234
Luoyi Fu and Xinzhe Fu and Zhiying Xu and Qianyang Peng and Xinbing Wang and Songwu Lu Determining Source--Destination Connectivity in Uncertain Networks: Modeling and Solutions . . . . . . . . . 3237--3252 Luca Bedogni and Angelo Trotta and Marco Di Felice and Yue Gao and Xingjian Zhang and Qianyun Zhang and Fabio Malabocchia and Luciano Bononi Dynamic Adaptive Video Streaming on Heterogeneous TVWS and Wi-Fi Networks 3253--3266 Cristina Cano and Douglas J. Leith and Andres Garcia-Saavedra and Pablo Serrano Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi . . . . . . . . . . . . . . . . 3267--3281 Ganesh C. Sankaran and Krishna M. Sivalingam Design and Analysis of Scheduling Algorithms for Optically Groomed Data Center Networks . . . . . . . . . . . . 3282--3293 Chen Sun and Jun Bi and Haoxian Chen and Hongxin Hu and Zhilong Zheng and Shuyong Zhu and Chenghui Wu SDPA: Toward a Stateful Data Plane in Software-Defined Networking . . . . . . 3294--3308 Kirill Kogan and Sergey I. Nikolenko and Patrick Eugster and Alexander Shalimov and Ori Rottenstreich Efficient FIB Representations on Distributed Platforms . . . . . . . . . 3309--3322 Cheng-Shang Chang and Cheng-Yu Chen and Duan-Shin Lee and Wanjiun Liao Efficient Encoding of User IDs for Nearly Optimal Expected Time-To-Rendezvous in Heterogeneous Cognitive Radio Networks . . . . . . . . 3323--3337 Tom Z. J. Fu and Jianbing Ding and Richard T. B. Ma and Marianne Winslett and Yin Yang and Zhenjie Zhang DRS: Auto-Scaling for Real-Time Stream Analytics . . . . . . . . . . . . . . . 3338--3352 Kristen Gardner and Mor Harchol-Balter and Alan Scheller-Wolf and Benny Van Houdt A Better Model for Job Redundancy: Decoupling Server Slowdown and Job Size 3353--3367 Tien Tran and Min Kyung An and Dung T. Huynh Antenna Orientation and Range Assignment Algorithms in Directional WSNs . . . . . 3368--3381 Zongqing Lu and Xiao Sun and Thomas La Porta Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure . . . . . . . 3382--3395 Nikolaos Sapountzis and Thrasyvoulos Spyropoulos and Navid Nikaein and Umer Salim User Association in HetNets: Impact of Traffic Differentiation and Backhaul Limitations . . . . . . . . . . . . . . 3396--3410 Mingwei Zhang and Jun Li and Scott Brooks I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes . . . . . 3411--3426 Yong Cui and Zhenjie Yang and Shihan Xiao and Xin Wang and Shenghui Yan Traffic-Aware Virtual Machine Migration in Topology-Adaptive DCN . . . . . . . . 3427--3440 Ying Cui and Muriel Medard and Edmund Yeh and Douglas Leith and Fan Lai and Ken R. Duffy A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem . . . . 3441--3454 Abhijit Bhattacharya and Anurag Kumar Analytical Modeling of IEEE 802.11-Type CSMA/CA Networks With Short Term Unfairness . . . . . . . . . . . . . . . 3455--3472 Lei Deng and Chih-Chun Wang and Minghua Chen and Shizhen Zhao Timely Wireless Flows With General Traffic Patterns: Capacity Region and Scheduling Algorithms . . . . . . . . . 3473--3486 Jiao Zhou and Zhao Zhang and Shaojie Tang and Xiaohui Huang and Yuchang Mo and Ding-Zhu Du Fault-Tolerant Virtual Backbone in Heterogeneous Wireless Sensor Network 3487--3499 Ye Liu and Chung Shue Chen and Chi Wan Sung and Chandramani Singh A Game Theoretic Distributed Algorithm for FeICIC Optimization in LTE-A HetNets 3500--3513 Changhoon Yoon and Seungsoo Lee and Heedo Kang and Taejune Park and Seungwon Shin and Vinod Yegneswaran and Phillip Porras and Guofei Gu Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks . . . . . . . . . . . . . . . . 3514--3530 Haipeng Dai and Yunhuai Liu and Guihai Chen and Xiaobing Wu and Tian He and Alex X. Liu and Huizhen Ma Safe Charging for Wireless Power Transfer . . . . . . . . . . . . . . . . 3531--3544 Ruozhou Yu and Guoliang Xue and Xiang Zhang The Critical Network Flow Problem: Migratability and Survivability . . . . 3545--3558 Ju Wang and Jie Xiong and Hongbo Jiang and Xiaojiang Chen and Dingyi Fang D-Watch: Embracing ``Bad'' Multipaths for Device-Free Localization With COTS RFID Devices . . . . . . . . . . . . . . 3559--3572 Quan Chen and Hong Gao and Siyao Cheng and Xiaolin Fang and Zhipeng Cai and Jianzhong Li Centralized and Distributed Delay-Bounded Scheduling Algorithms for Multicast in Duty-Cycled Wireless Sensor Networks . . . . . . . . . . . . . . . . 3573--3586 Hongli Xu and Zhuolong Yu and Chen Qian and Xiang-Yang Li and Zichun Liu and Liusheng Huang Minimizing Flow Statistics Collection Cost Using Wildcard-Based Requests in SDNs . . . . . . . . . . . . . . . . . . 3587--3601 Xin Wang and Richard T. B. Ma and Yinlong Xu The Role of Data Cap in Optimal Two-Part Network Pricing . . . . . . . . . . . . 3602--3615 Xiaofeng Gao and Zhiyin Chen and Fan Wu and Guihai Chen Energy Efficient Algorithms for $k$-Sink Minimum Movement Target Coverage Problem in Mobile Sensor Network . . . . . . . . 3616--3627 Alessandro Checco and Doug J. Leith Fast, Responsive Decentralized Graph Coloring . . . . . . . . . . . . . . . . 3628--3640 Avhishek Chatterjee and Lav R. Varshney and Sriram Vishwanath Work Capacity of Regulated Freelance Platforms: Fundamental Limits and Decentralized Schemes . . . . . . . . . 3641--3654 Andreas Fiessler and Claas Lorenz and Sven Hager and Bjorn Scheuermann and Andrew W. Moore HyPaFilter+: Enhanced Hybrid Packet Filtering Using Hardware Assisted Classification and Header Space Analysis 3655--3669 Mehrnoosh Shafiee and Javad Ghaderi A Simple Congestion-Aware Algorithm for Load Balancing in Datacenter Networks 3670--3682 Vaneet Aggarwal and Yih-Farn Robin Chen and Tian Lan and Yu Xiang Sprout: a Functional Caching Approach to Minimize Service Latency in Erasure-Coded Storage . . . . . . . . . 3683--3694 Andrea Munari and Petri Mahonen and Marina Petrova A Stochastic Geometry Approach to Asynchronous Aloha Full-Duplex Networks 3695--3708 Faraz Ahmed and Jeffrey Erman and Zihui Ge and Alex X. Liu and Jia Wang and He Yan Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services Based on TCP Loss Ratio and Round Trip Time . . . . . . . . . . 3709--3722 Chaoli Zhang and Fan Wu and Xiaofeng Gao and Guihai Chen Free Talk in the Air: a Hierarchical Topology for 60 GHz Wireless Data Center Networks . . . . . . . . . . . . . . . . 3723--3737 Qingjun Xiao and Shigang Chen and You Zhou and Min Chen and Junzhou Luo and Tengli Li and Yibei Ling Cardinality Estimation for Elephant Flows: a Compact Solution Based on Virtual Register Sharing . . . . . . . . 3738--3752 Jingyuan Fan and Chaowen Guan and Kui Ren and Yong Cui and Chunming Qiao SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox . . . . 3753--3766 Tingwei Zhu and Dan Feng and Fang Wang and Yu Hua and Qingyu Shi and Jiahao Liu and Yongli Cheng and Yong Wan Efficient Anonymous Communication in SDN-Based Data Center Networks . . . . . 3767--3780 Xiaolong Zheng and Jiliang Wang and Longfei Shangguan and Zimu Zhou and Yunhao Liu Design and Implementation of a CSI-Based Ubiquitous Smoking Detection System . . 3781--3793 Kun Xie and Xiaocan Li and Xin Wang and Gaogang Xie and Jigang Wen and Jiannong Cao and Dafang Zhang Fast Tensor Factorization for Accurate Internet Anomaly Detection . . . . . . . 3794--3807 Tao Zhang and Jianxin Wang and Jiawei Huang and Jianer Chen and Yi Pan and Geyong Min Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Intra-Datacenter . . . . . . . . . . . . 3808--3822 Lei Yang and Yao Li and Qiongzheng Lin and Huanyu Jia and Xiang-Yang Li and Yunhao Liu Tagbeat: Sensing Mechanical Vibration Period With COTS RFID Systems . . . . . 3823--3835 Haiying Shen and Liuhua Chen Distributed Autonomous Virtual Resource Management in Datacenters Using Finite-Markov Decision Process . . . . . 3836--3849 Arsalan Sharifnassab and S. Jamaloddin Golestani On the Possibility of Network Scheduling With Polynomial Complexity and Delay . . 3850--3862 Jesus Gomez-Vilardebo Competitive Design of Energy Harvesting Communications in Wireless Fading Channels . . . . . . . . . . . . . . . . 3863--3872
Haiyang Wang and Tong Li and Ryan Shea and Xiaoqiang Ma and Feng Wang and Jiangchuan Liu and Ke Xu Toward Cloud-Based Distributed Interactive Applications: Measurement, Modeling, and Analysis . . . . . . . . . 3--16 Falko Dressler and Florian Klingler and Christoph Sommer and Reuven Cohen Not All VANET Broadcasts Are the Same: Context-Aware Class Based Broadcast . . 17--30 Cheng-Shang Chang and Duan-Shin Lee and Li-Heng Liou and Sheng-Min Lu and Mu-Huan Wu A Probabilistic Framework for Structural Analysis and Community Detection in Directed Networks . . . . . . . . . . . 31--46 Jelena Diakonikolas and Gil Zussman On the Rate Regions of Single-Channel and Multi-Channel Full-Duplex Links . . 47--60 Antonios Michaloliakos and Weng Chon Ao and Konstantinos Psounis and Yonglong Zhang Asynchronously Coordinated Multi-Timescale Beamforming Architecture for Multi-Cell Networks . . . . . . . . 61--75 Faraz Ahmed and M. Zubair Shafiq and Amir R. Khakpour and Alex X. Liu Optimizing Internet Transit Routing for Content Delivery Networks . . . . . . . 76--89 Yongquan Fu and Pere Barlet-Ros and Dongsheng Li Every Timestamp Counts: Accurate Tracking of Network Latencies Using Reconcilable Difference Aggregator . . . 90--103 Emad Alasadi and Hamed S. Al-Raweshidy SSED: Servers Under Software-Defined Network Architectures to Eliminate Discovery Messages . . . . . . . . . . . 104--117 Bo Li and Junfeng Wu and Hongsheng Qi and Alexandre Proutiere and Guodong Shi Boolean Gossip Networks . . . . . . . . 118--130 Ido Nevat and Dinil Mon Divakaran and Sai Ganesh Nagarajan and Pengfei Zhang and Le Su and Li Ling Ko and Vrizlynn L. L. Thing Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic . . . . . . . . . . . . . . . . 131--144 Yong Cui and Shihan Xiao and Xin Wang and Zhenjie Yang and Shenghui Yan and Chao Zhu and Xiang-Yang Li and Ning Ge Diamond: Nesting the Data Center Network With Wireless Rings in $3$-D Space . . . 145--160 Fu Xiao and Zhongqin Wang and Ning Ye and Ruchuan Wang and Xiang-Yang Li One More Tag Enables Fine-Grained RFID Localization and Tracking . . . . . . . 161--174 David Gonzalez G. and Harri Hakula and Antti Rasila and Jyri Hamalainen Spatial Mappings for Planning and Optimization of Cellular Networks . . . 175--188 Fei Chen and Chunming Wu and Xiaoyan Hong and Bin Wang Easy Path Programming: Elevate Abstraction Level for Network Functions 189--202 M. Saifur Rahman and Md. Yusuf Sarwar Uddin and Tahmid Hasan and M. Sohel Rahman and M. Kaykobad Using Adaptive Heartbeat Rate on Long-Lived TCP Connections . . . . . . . 203--216 Peng He and Wenyuan Zhang and Hongtao Guan and Kave Salamatian and Gaogang Xie Partial Order Theory for Fast TCAM Updates . . . . . . . . . . . . . . . . 217--230 Lei Xie and Chuyu Wang and Alex X. Liu and Jianqiang Sun and Sanglu Lu Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals . . . . . . . . . . . . . . . . 231--244 Truong Khoa Phan and David Griffin and Elisa Maini and Miguel Rio Utility-Centric Networking: Balancing Transit Costs With Quality of Experience 245--258 Matthew A. Clark and Konstantinos Psounis Trading Utility for Privacy in Shared Spectrum Access Systems . . . . . . . . 259--273 Qingxia Chen and F. Richard Yu and Tao Huang and Renchao Xie and Jiang Liu and Yunjie Liu Joint Resource Allocation for Software-Defined Networking, Caching, and Computing . . . . . . . . . . . . . 274--287 Woong-Hee Lee and Jeong-Sik Choi and Yong-Hwa Kim and Jong-Ho Lee and Seong-Cheol Kim Adaptive Sector Coloring Game for Geometric Network Information-Based Inter-Cell Interference Coordination in Wireless Cellular Networks . . . . . . . 288--301 Giovanni Neglia and Damiano Carra and Pietro Michiardi Cache Policies for Linear Utility Maximization . . . . . . . . . . . . . . 302--313 Haipeng Dai and Huizhen Ma and Alex X. Liu and Guihai Chen Radiation Constrained Scheduling of Wireless Charging Tasks . . . . . . . . 314--327 Klaus-Tycho Foerster and Arne Ludwig and Jan Marcinkowski and Stefan Schmid Loop-Free Route Updates for Software-Defined Networks . . . . . . . 328--341 Pavel Chuprikov and Sergey I. Nikolenko and Alex Davydow and Kirill Kogan Priority Queueing for Packets With Two Characteristics . . . . . . . . . . . . 342--355 Daniela Aguirre-Guerrero and Miguel Camelo and Lluis Fabrega and Pere Vila WMGR: a Generic and Compact Routing Scheme for Data Center Networks . . . . 356--369 Yasaman Keshtkarjahromi and Hulya Seferoglu and Rashid Ansari and Ashfaq Khokhar Device-to-Device Networking Meets Cellular via Network Coding . . . . . . 370--383 Yuan Yang and Mingwei Xu and Qi Li Fast Rerouting Against Multi-Link Failures Without Topology Constraint . . 384--397 Scott T. Rager and Ertugrul N. Ciftcioglu and Ram Ramanathan and Thomas F. La Porta and Ramesh Govindan Scalability and Satisfiability of Quality-of-Information in Wireless Networks . . . . . . . . . . . . . . . . 398--411 Bei Liu and Wei Wang and Donghyun Kim and Yingshu Li and Sung-Sik Kwon and Yaolin Jiang On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks . . . . . 412--421 Carlo Fuerst and Stefan Schmid and Lalith Suresh and Paolo Costa Kraken: Online and Elastic Resource Reservations for Cloud Datacenters . . . 422--435 Ruiting Zhou and Zongpeng Li and Chuan Wu Scheduling Frameworks for Cloud Container Services . . . . . . . . . . . 436--450 Luca Barletta and Flaminio Borgonovo and Ilario Filippini The Throughput and Access Delay of Slotted-Aloha With Exponential Backoff 451--464 Chi-Han Lin and Yi-Ting Chen and Kate Ching-Ju Lin and Wen-Tsuen Chen FDoF: Enhancing Channel Utilization for 802.11ac . . . . . . . . . . . . . . . . 465--477 Kechao Cai and Hong Xie and John C. S. Lui Information Spreading Forensics via Sequential Dependent Snapshots . . . . . 478--491 Jie Zhao and Qiang Liu and Xin Wang and Shiwen Mao Scheduling of Collaborative Sequential Compressed Sensing Over Wide Spectrum Band . . . . . . . . . . . . . . . . . . 492--505 Abhishek Sinha and Eytan Modiano Optimal Control for Generalized Network-Flow Problems . . . . . . . . . 506--519 Haipeng Dai and Yunhuai Liu and Guihai Chen and Xiaobing Wu and Tian He and Alex X. Liu and Yang Zhao SCAPE: Safe Charging With Adjustable Power . . . . . . . . . . . . . . . . . 520--533 Peter Peresini and Maciej Kuzniar and Dejan Kostic Dynamic, Fine-Grained Data Plane Monitoring With Monocle . . . . . . . . 534--547 Andrea Araldo and Gyorgy Dan and Dario Rossi Caching Encrypted Content Via Stochastic Cache Partitioning . . . . . . . . . . . 548--561 Pengzhan Wang and Hongli Xu and Liusheng Huang and Chen Qian and Shaowei Wang and Yanjing Sun Minimizing Controller Response Time Through Flow Redirecting in SDNs . . . . 562--575 Guang Yang and Ming Xiao and Hussein Al-Zubaidy and Yongming Huang and James Gross Analysis of Millimeter-Wave Multi-Hop Networks With Full-Duplex Buffered Relays . . . . . . . . . . . . . . . . . 576--590 Marcin Bienkowski and Nadi Sarrar and Stefan Schmid and Steve Uhlig Online Aggregation of the Forwarding Information Base: Accounting for Locality and Churn . . . . . . . . . . . 591--604 Bin Tang and Shenghao Yang An LDPC Approach for Chunked Network Codes . . . . . . . . . . . . . . . . . 605--617 Hongli Xu and He Huang and Shigang Chen and Gongming Zhao and Liusheng Huang Achieving High Scalability Through Hybrid Switching in Software-Defined Networking . . . . . . . . . . . . . . . 618--632 Luoyi Fu and Xinzhe Fu and Zesen Zhang and Zhiying Xu and Xudong Wu and Xinbing Wang and Songwu Lu Joint Optimization of Multicast Energy in Delay-Constrained Mobile Wireless Networks . . . . . . . . . . . . . . . . 633--646
Eric Norige and Alex X. Liu and Eric Torng and Eric Torng and Eric Norige and Alex X. Liu A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems . . . . . . . . . 657--670 Desheng Zhang and Tian He and Fan Zhang and Chengzhong Xu and Tian He and Fan Zhang and Desheng Zhang and Chengzhong Xu Urban-Scale Human Mobility Modeling With Multi-Source Urban Network Data . . . . 671--684 Haichuan Ding and Chi Zhang and Xuanheng Li and Jianqing Liu and Miao Pan and Yuguang Fang and Shigang Chen and Yuguang Fang and Chi Zhang and Miao Pan and Xuanheng Li and Jianqing Liu and Haichuan Ding and Shigang Chen Session-Based Cooperation in Cognitive Radio Networks: a Network-Level Approach 685--698 Yongzheng Jia and Chuan Wu and Zongpeng Li and Franck Le and Alex Liu and Zongpeng Li and Yongzheng Jia and Chuan Wu and Franck Le and Alex Liu Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters . . . 699--710 Yuxiao Hou and Yuanqing Zheng and Yuxiao Hou and Yuanqing Zheng PHY-Tree: Physical Layer Tree-Based RFID Identification . . . . . . . . . . . . . 711--723 Han Deng and I-Hong Hou and I-Hong Hou and Han Deng Optimal Capacity Provisioning for Online Job Allocation With Hard Allocation Ratio Requirement . . . . . . . . . . . 724--736 Stratis Ioannidis and Edmund Yeh and Edmund Yeh and Stratis Ioannidis Adaptive Caching Networks With Optimality Guarantees . . . . . . . . . 737--750 Wei Gong and Haoxiang Liu and Jiangchuan Liu and Xiaoyi Fan and Kebin Liu and Qiang Ma and Xiaoyu Ji and Kebin Liu and Jiangchuan Liu and Xiaoyi Fan and Qiang Ma and Haoxiang Liu and Wei Gong and Xiaoyu Ji Channel-Aware Rate Adaptation for Backscatter Networks . . . . . . . . . . 751--764 Yue Cao and Zhiyun Qian and Zhongjie Wang and Tuan Dao and Srikanth V. Krishnamurthy and Lisa M. Marvel and Yue Cao and Tuan Dao and Lisa M. Marvel and Zhongjie Wang and Zhiyun Qian and Srikanth V. Krishnamurthy Off-Path TCP Exploits of the Challenge ACK Global Rate Limit . . . . . . . . . 765--778 Tingjun Chen and Javad Ghaderi and Dan Rubenstein and Gil Zussman and Dan Rubenstein and Tingjun Chen and Javad Ghaderi and Gil Zussman Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints . . . . . . 779--792 Kun Xie and Lele Wang and Xin Wang and Gaogang Xie and Jigang Wen and Guangxing Zhang and Jiannong Cao and Dafang Zhang and Kun Xie and Xin Wang and Dafang Zhang and Jiannong Cao and Lele Wang and Gaogang Xie and Jigang Wen and Guangxing Zhang Accurate Recovery of Internet Traffic Data: a Sequential Tensor Completion Approach . . . . . . . . . . . . . . . . 793--806 Jian Du and Xue Liu and Lei Rao and Jian Du and Lei Rao and Xue Liu Proactive Doppler Shift Compensation in Vehicular Cyber-Physical Systems . . . . 807--818 Yoann Desmouceaux and Pierre Pfister and Jerome Tollet and Mark Townsley and Thomas Clausen and Jerome Tollet and Mark Townsley and Yoann Desmouceaux and Thomas Clausen and Pierre Pfister 6LB: Scalable and Application-Aware Load Balancing with Segment Routing . . . . . 819--834 Anat Bremler-Barr and Yotam Harchol and David Hay and Yacov Hel-Or and Yotam Harchol and Anat Bremler-Barr and David Hay and Yacov Hel-Or Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications . . . . . . . . . . . . . . 835--850 Jiayi Liu and Qinghai Yang and Gwendal Simon and Jiayi Liu and Gwendal Simon and Qinghai Yang Congestion Avoidance and Load Balancing in Content Placement and Request Redirection for Mobile CDN . . . . . . . 851--863 Shiva Raj Pokhrel and Carey Williamson and Carey Williamson and Shiva Raj Pokhrel Modeling Compound TCP Over WiFi for IoT 864--878 Avhishek Chatterjee and Michael Borokhovich and Lav R. Varshney and Sriram Vishwanath and Lav R. Varshney and Avhishek Chatterjee and Sriram Vishwanath and Michael Borokhovich Efficient and Flexible Crowdsourcing of Specialized Tasks With Precedence Constraints . . . . . . . . . . . . . . 879--892 Xiaoqi Ren and Palma London and Juba Ziani and Adam Wierman and Palma London and Juba Ziani and Adam Wierman and Xiaoqi Ren Datum: Managing Data Purchasing and Data Placement in a Geo-Distributed Data Market . . . . . . . . . . . . . . . . . 893--905 Cheng-Shang Chang and Duan-Shin Lee and Chia-Kai Su and Cheng-Shang Chang and Chia-Kai Su and Duan-Shin Lee Greenput: a Power-Saving Algorithm That Achieves Maximum Throughput in Wireless Networks . . . . . . . . . . . . . . . . 906--919 Thomas Blasius and Tobias Friedrich and Anton Krohmer and Soren Laue and Anton Krohmer and Soren Laue and Tobias Friedrich and Thomas Blasius Efficient Embedding of Scale-Free Graphs in the Hyperbolic Plane . . . . . . . . 920--933 Cory J. Kleinheksel and Arun K. Somani and Arun K. Somani and Cory J. Kleinheksel Enhancing Fault Tolerance and Resource Utilization in Unidirectional Quorum-Based Cycle Routing . . . . . . . 934--947 Arsany Basta and Andreas Blenk and Szymon Dudycz and Arne Ludwig and Stefan Schmid and Stefan Schmid and Szymon Dudycz and Andreas Blenk and Arne Ludwig and Arsany Basta Efficient Loop-Free Rerouting of Multiple SDN Flows . . . . . . . . . . . 948--961 Bo Yan and Yang Xu and H. Jonathan Chao and H. Jonathan Chao and Yang Xu and Bo Yan Adaptive Wildcard Rule Cache Management for Software-Defined Networks . . . . . 962--975 Jhih-Yu Huang and Pi-Chung Wang and Jhih-Yu Huang and Pi-Chung Wang TCAM-Based IP Address Lookup Using Longest Suffix Split . . . . . . . . . . 976--989 Xiaofeng Gao and Jiahao Fan and Fan Wu and Guihai Chen and Jiahao Fan and Guihai Chen and Xiaofeng Gao and Fan Wu Approximation Algorithms for Sweep Coverage Problem With Multiple Mobile Sensors . . . . . . . . . . . . . . . . 990--1003 Sheng-Chun Kao and Ding-Yuan Lee and Ting-Sheng Chen and An-Yeu Wu and Sheng-Chun Kao and Ding-Yuan Lee and An-Yeu Wu and Ting-Sheng Chen Dynamically Updatable Ternary Segmented Aging Bloom Filter for OpenFlow-Compliant Low-Power Packet Processing . . . . . . . . . . . . . . . 1004--1017 Hongbo Jiang and Ping Zhao and Chen Wang and Chen Wang and Hongbo Jiang and Ping Zhao RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries . . . 1018--1032 Ye Liu and Chung Shue Chen and Chi Wan Sung and Chandramani Singh and Ye Liu and Chi Wan Sung and Chung Shue Chen and Chandramani Singh Corrections to ``A Game Theoretic Distributed Algorithm for FeICIC Optimization in LTE-A HetNets'' . . . . 1033--1033
Qian Ma and Lin Gao and Ya-Feng Liu and Jianwei Huang Incentivizing Wi-Fi Network Crowdsourcing: a Contract Theoretic Approach . . . . . . . . . . . . . . . . 1035--1048 Ying Zhang and Lei Deng and Minghua Chen and Peijian Wang Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse? . . . 1049--1062 Soumya Basu and Aditya Sundarrajan and Javad Ghaderi and Sanjay Shakkottai and Ramesh Sitaraman Adaptive TTL-Based Caching for Content Delivery . . . . . . . . . . . . . . . . 1063--1077 Li Yan and Haiying Shen and Kang Chen MobiT: Distributed and Congestion-Resilient Trajectory-Based Routing for Vehicular Delay Tolerant Networks . . . . . . . . . . . . . . . . 1078--1091 Luoyi Fu and Songjun Ma and Lingkun Kong and Shiyu Liang and Xinbing Wang FINE: a Framework for Distributed Learning on Incomplete Observations for Heterogeneous Crowdsensing Networks . . 1092--1109 Jose Yallouz and Ori Rottenstreich and Peter Babarczi and Avi Mendelson and Ariel Orda Minimum-Weight Link-Disjoint Node-``Somewhat Disjoint'' Paths . . . . 1110--1122 Gang Wang and Bolun Wang and Tianyi Wang and Ana Nika and Haitao Zheng and Ben Y. Zhao Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services . . 1123--1136 Kun Xie and Can Peng and Xin Wang and Gaogang Xie and Jigang Wen and Jiannong Cao and Dafang Zhang and Zheng Qin Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements 1137--1150 Ye Yu and Djamal Belazzougui and Chen Qian and Qin Zhang Memory-Efficient and Ultra-Fast Network Lookup and Forwarding Using Othello Hashing . . . . . . . . . . . . . . . . 1151--1164 Gil Einziger and Benny Fellman and Roy Friedman and Yaron Kassner ICE Buckets: Improved Counter Estimation for Network Measurement . . . . . . . . 1165--1178 Carlee Joe-Wong and Soumya Sen and Sangtae Ha Sponsoring Mobile Data: Analyzing the Impact on Internet Stakeholders . . . . 1179--1192 Wenxin Li and Xiaobo Zhou and Keqiu Li and Heng Qi and Deke Guo TrafficShaper: Shaping Inter-Datacenter Traffic to Reduce the Transmission Cost 1193--1206 Haiying Shen and Liuhua Chen Resource Demand Misalignment: an Important Factor to Consider for Reducing Resource Over-Provisioning in Cloud Datacenters . . . . . . . . . . . 1207--1221 Kun Xie and Xiaocan Li and Xin Wang and Jiannong Cao and Gaogang Xie and Jigang Wen and Dafang Zhang and Zheng Qin On-Line Anomaly Detection With High Accuracy . . . . . . . . . . . . . . . . 1222--1235 Xiaocong Jin and Yanchao Zhang Privacy-Preserving Crowdsourced Spectrum Sensing . . . . . . . . . . . . . . . . 1236--1249 Mate Nagy and Janos Tapolcai and Gabor Retvari Node Virtualization for IP Level Resilience . . . . . . . . . . . . . . . 1250--1263 Yitu Wang and Wei Wang and Ying Cui and Kang G. Shin and Zhaoyang Zhang Distributed Packet Forwarding and Caching Based on Stochastic Network Utility Maximization . . . . . . . . . . 1264--1277 Dongxiao Yu and Yifei Zou and Jiguo Yu and Xiuzhen Cheng and Qiang-Sheng Hua and Hai Jin and Francis C. M. Lau Stable Local Broadcast in Multihop Wireless Networks Under SINR . . . . . . 1278--1291 Marco Chiesa and Gabor Retvari and Michael Schapira Oblivious Routing in IP Networks . . . . 1292--1305 Talha Cihad Gulcu and Vaggos Chatziafratis and Yingrui Zhang and Osman Yagan Attack Vulnerability of Power Systems Under an Equal Load Redistribution Model 1306--1319 Nicolas Huin and Brigitte Jaumard and Frederic Giroire Optimal Network Service Chain Provisioning . . . . . . . . . . . . . . 1320--1333 Sabrina Klos nee Muller and Cem Tekin and Mihaela van der Schaar and Anja Klein Context-Aware Hierarchical Online Learning for Performance Maximization in Mobile Crowdsourcing . . . . . . . . . . 1334--1347 Haiying Shen and Liuhua Chen CompVM: a Complementary VM Allocation Mechanism for Cloud Systems . . . . . . 1348--1361 Xingliang Yuan and Huayi Duan and Cong Wang Assuring String Pattern Matching in Outsourced Middleboxes . . . . . . . . . 1362--1375 Guo Chen and Yuanwei Lu and Yuan Meng and Bojie Li and Kun Tan and Dan Pei and Peng Cheng and Layong Luo and Yongqiang Xiong and Xiaoliang Wang and Youjian Zhao FUSO: Fast Multi-Path Loss Recovery for Data Center Networks . . . . . . . . . . 1376--1389 Guillaume Artero Gallardo and Gentian Jakllari and Lucile Canourgues and Andre-Luc Beylot Statistical Admission Control in Multi-Hop Cognitive Radio Networks . . . 1390--1403 Marton Sipos and Josh Gahm and Narayan Venkat and Dave Oran Network-Aware Feasible Repairs for Erasure-Coded Storage . . . . . . . . . 1404--1417 Tao Zhao and Korok Ray and I-Hong Hou A Non-Monetary Mechanism for Optimal Rate Control Through Efficient Cost Allocation . . . . . . . . . . . . . . . 1418--1431 Fan Wu and Tong Meng and Aijing Li and Guihai Chen and Nitin H. Vaidya Have You Recorded My Voice: Toward Robust Neighbor Discovery in Mobile Wireless Networks . . . . . . . . . . . 1432--1445 Zhen Tu and Fengli Xu and Yong Li and Pengyu Zhang and Depeng Jin A New Privacy Breach: User Trajectory Recovery From Aggregated Mobility Data 1446--1459 Huikang Li and Yi Gao and Wei Dong and Chun Chen Taming Both Predictable and Unpredictable Link Failures for Network Tomography . . . . . . . . . . . . . . . 1460--1473 Sherif ElAzzouni and Eylem Ekici Node-Based Distributed Channel Access With Enhanced Delay Characteristics . . 1474--1487 Chen Tian and Ali Munir and Alex X. Liu and Jie Yang and Yangming Zhao OpenFunction: an Extensible Data Plane Abstraction Protocol for Platform-Independent Software-Defined Middleboxes . . . . . . . . . . . . . . 1488--1501 Beatriz Lorenzo and Alireza Shams Shafigh and Jianqing Liu and Francisco J. Gonzalez-Castano and Yuguang Fang Data and Spectrum Trading Policies in a Trusted Cognitive Dynamic Network Architecture . . . . . . . . . . . . . . 1502--1516 Kaikai Liu and Xiaolin Li Enhancing Localization Scalability and Accuracy via Opportunistic Sensing . . . 1517--1530 Lei Jiao and Antonia Maria Tulino and Jaime Llorca and Yue Jin and Alessandra Sala Corrections to ``Smoothed Online Resource Allocation in Multi-Tier Distributed Cloud Networks'' . . . . . . 1531--1531
Danfeng Shan and Fengyuan Ren ECN Marking With Micro-Burst Traffic: Problem, Analysis, and Improvement . . . 1533--1546 Sajad Shirali-Shahreza and Yashar Ganjali Delayed Installation and Expedited Eviction: an Alternative Approach to Reduce Flow Table Occupancy in SDN Switches . . . . . . . . . . . . . . . . 1547--1561 Tung-Wei Kuo and Bang-Heng Liou and Kate Ching-Ju Lin and Ming-Jer Tsai Deploying Chains of Virtual Network Functions: On the Relation Between Link and Server Usage . . . . . . . . . . . . 1562--1576 Apostolos Destounis and Stefano Paris and Lorenzo Maggi and Georgios S. Paschos and Jeremie Leguay Minimum Cost SDN Routing With Reconfiguration Frequency Constraints 1577--1590 Yu Ma and Weifa Liang and Wenzheng Xu Charging Utility Maximization in Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously 1591--1604 Hao Yu and Michael J. Neely A New Backpressure Algorithm for Joint Rate Control and Routing With Vanishing Utility Optimality Gaps and Finite Queue Lengths . . . . . . . . . . . . . . . . 1605--1618 Lixing Chen and Sheng Zhou and Jie Xu Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks . . . . . . . . . 1619--1632 Anis Elgabli and Vaneet Aggarwal and Shuai Hao and Feng Qian and Subhabrata Sen LBP: Robust Rate Adaptation Algorithm for SVC Video Streaming . . . . . . . . 1633--1645 Jianping Weng and Jessie Hui Wang and Jiahai Yang and Yang Root Cause Analysis of Anomalies of Multitier Services in Public Clouds . . 1646--1659 Jiangbo Qian and Zhipeng Huang and Qiang Zhu and Huahui Chen Hamming Metric Multi-Granularity Locality-Sensitive Bloom Filter . . . . 1660--1673 Mehrnoosh Shafiee and Javad Ghaderi An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters . . . . . . . . . 1674--1687 Pengjin Xie and Jingchao Feng and Zhichao Cao and Jiliang Wang GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices 1688--1700 Fu Xiao and Lei Chen and Chaoheng Sha and Lijuan Sun and Ruchuan Wang and Alex X. Liu and Faraz Ahmed Noise Tolerant Localization for Sensor Networks . . . . . . . . . . . . . . . . 1701--1714 Qi Li and Yanyu Chen and Patrick P. C. Lee and Mingwei Xu and Kui Ren Security Policy Violations in SDN Data Plane . . . . . . . . . . . . . . . . . 1715--1727 Kai Han and He Huang and Jun Luo Quality-Aware Pricing for Mobile Crowdsensing . . . . . . . . . . . . . . 1728--1741 Jingyuan Fan and Chaowen Guan and Kui Ren and Chunming Qiao Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic . . . . . . . . . . . . . . . . 1742--1753 Tatsuya Otoshi and Yuichi Ohsita and Masayuki Murata and Yousuke Takahashi and Keisuke Ishibashi and Kohei Shiomoto and Tomoaki Hashimoto Hierarchical Model Predictive Traffic Engineering . . . . . . . . . . . . . . 1754--1767 Ping-Chun Hsieh and I-Hong Hou Heavy-Traffic Analysis of QoE Optimality for On-Demand Video Streams Over Fading Channels . . . . . . . . . . . . . . . . 1768--1781 Ravi Kumar Kolla and Krishna Jagannathan and Aditya Gopalan Collaborative Learning of Stochastic Bandits Over a Social Network . . . . . 1782--1795 Peruru Subrahmanya Swamy and Venkata Pavan Kumar Bellam and Radha Krishna Ganti and Krishna Jagannathan Efficient CSMA Using Regional Free Energy Approximations . . . . . . . . . 1796--1809 Longbo Huang and Minghua Chen and Yunxin Liu Learning-Aided Stochastic Network Optimization With State Prediction . . . 1810--1820 Tong Yang and Gaogang Xie and Alex X. Liu and Qiaobin Fu and Yanbiao Li and Xiaoming Li and Laurent Mathy Constant IP Lookup With FIB Explosion 1821--1836 Gongming Zhao and Hongli Xu and Shigang Chen and Liusheng Huang and Pengzhan Wang Joint Optimization of Flow Table and Group Table for Default Paths in SDNs 1837--1850 Timmy Schuller and Nils Aschenbruck and Markus Chimani and Martin Horneffer and Stefan Schnitter Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network . . . . . . . . . . 1851--1864 Haipeng Dai and Xiaoyu Wang and Alex X. Liu and Huizhen Ma and Guihai Chen and Wanchun Dou Wireless Charger Placement for Directional Charging . . . . . . . . . . 1865--1878 Sebastien Henri and Christina Vlachou and Patrick Thiran Multi-Armed Bandit in Action: Optimizing Performance in Dynamic Hybrid Networks 1879--1892 Abusayeed Saifullah and Mahbubur Rahman and Dali Ismail and Chenyang Lu and Jie Liu and Ranveer Chandra Low-Power Wide-Area Network Over White Spaces . . . . . . . . . . . . . . . . . 1893--1906 Sorrachai Yingchareonthawornchai and James Daly and Alex X. Liu and Eric Torng A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classification . . . . . . . . . . . . . 1907--1920 Abubakr O. Al-Abbasi and Vaneet Aggarwal Video Streaming in Distributed Erasure-Coded Storage Systems: Stall Duration Analysis . . . . . . . . . . . 1921--1932 Ning Li and Jose-Fernan Martinez-Ortega and Vicente Hernandez Diaz and Jose Antonio Sanchez Fernandez Probability Prediction-Based Reliable and Efficient Opportunistic Routing Algorithm for VANETs . . . . . . . . . . 1933--1947 Zhuotao Liu and Hao Jin and Yih-Chun Hu and Michael Bailey Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control . . . . . . . 1948--1961 Shuo Wang and Jiao Zhang and Tao Huang and Tian Pan and Jiang Liu and Yunjie Liu Multi-Attributes-Based Coflow Scheduling Without Prior Knowledge . . . . . . . . 1962--1975 Xueying Guo and Rahul Singh and P. R. Kumar and Zhisheng Niu A Risk-Sensitive Approach for Packet Inter-Delivery Time Optimization in Networked Cyber-Physical Systems . . . . 1976--1989 Morteza Mehrnoush and Vanlin Sathya and Sumit Roy and Monisha Ghosh Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold . . . . . . . 1990--2003
Simone Ferlin and Stepan Kucera and Holger Claussen and Ozgu Alay MPTCP Meets FEC: Supporting Latency-Sensitive Applications Over Heterogeneous Networks . . . . . . . . . 2005--2018 Haiming Jin and Lu Su and Houping Xiao and Klara Nahrstedt Incentive Mechanism for Privacy-Aware Data Aggregation in Mobile Crowd Sensing Systems . . . . . . . . . . . . . . . . 2019--2032 Ying Cui and Muriel Medard and Edmund Yeh and Douglas Leith and Ken R. Duffy Optimization-Based Linear Network Coding for General Connections of Continuous Flows . . . . . . . . . . . . . . . . . 2033--2047 Haifeng Zhou and Chunming Wu and Chengyu Yang and Pengfei Wang and Qi Yang and Zhouhao Lu and Qiumei Cheng SDN--RDCD: a Real-Time and Reliable Method for Detecting Compromised SDN Devices . . . . . . . . . . . . . . . . 2048--2061 Ming Tang and Haitian Pang and Shou Wang and Lin Gao and Jianwei Huang and Lifeng Sun Multi-Dimensional Auction Mechanisms for Crowdsourced Mobile Video Streaming . . 2062--2075 Christopher G. Brinton and Swapna Buccapatnam and Liang Zheng and Da Cao and Andrew S. Lan and Felix M. F. Wong and Sangtae Ha and Mung Chiang and H. Vincent Poor On the Efficiency of Online Social Learning Networks . . . . . . . . . . . 2076--2089 Jianan Zhang and Eytan Modiano Connectivity in Interdependent Networks 2090--2103 Yifei Yuan and Dong Lin and Siri Anil and Harsh Verma and Anirudh Chelluri and Rajeev Alur and Boon Thau Loo NetEgg: a Scenario-Based Programming Toolkit for SDN Policies . . . . . . . . 2104--2117 Hao Feng and Jaime Llorca and Antonia M. Tulino and Andreas F. Molisch Optimal Dynamic Cloud Network Control 2118--2131 Yifei Zhu and Silvery D. Fu and Jiangchuan Liu and Yong Cui Truthful Online Auction Toward Maximized Instance Utilization in the Cloud . . . 2132--2145 Lei Xie and Qingliang Cai and Alex X. Liu and Wei Wang and Yafeng Yin and Sanglu Lu Synchronize Inertial Readings From Multiple Mobile Devices in Spatial Dimension . . . . . . . . . . . . . . . 2146--2159 Satyam Agarwal and Swades De Rural Broadband Access via Clustered Collaborative Communication . . . . . . 2160--2173 Seongmin Kim and Juhyeng Han and Jaehyeong Ha and Taesoo Kim and Dongsu Han SGX-Tor: a Secure and Practical Tor Anonymity Network With SGX Enclaves . . 2174--2187 Robert Soule and Shrutarshi Basu and Parisa Jalili Marandi and Fernando Pedone and Robert Kleinberg and Emin Gun Sirer and Nate Foster Merlin: a Language for Managing Network Resources . . . . . . . . . . . . . . . 2188--2201 Konstantinos Psychas and Javad Ghaderi Randomized Algorithms for Scheduling Multi-Resource Jobs in the Cloud . . . . 2202--2215 Leonardo Maccari and Renato Lo Cigno Improving Routing Convergence With Centrality: Theory and Implementation of Pop-Routing . . . . . . . . . . . . . . 2216--2229 Zhemin Qian and Fujie Fan and Bing Hu and Kwan L. Yeung and Liyan Li Global Round Robin: Efficient Routing With Cut-Through Switching in Fat-Tree Data Center Networks . . . . . . . . . . 2230--2241 Tianyuan Sun and Yongcai Wang and Deying Li and Zhaoquan Gu and Jia Xu WCS: Weighted Component Stitching for Sparse Network Localization . . . . . . 2242--2253 Jianyuan Lu and Tong Yang and Yi Wang and Huichen Dai and Xi Chen and Linxiao Jin and Haoyu Song and Bin Liu Low Computational Cost Bloom Filters . . 2254--2267 Monireh Dabaghchian and Amir Alipour-Fanid and Kai Zeng and Qingsi Wang and Peter Auer Online Learning With Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks . . . . . . . . 2268--2281 Anfu Zhou and Teng Wei and Xinyu Zhang and Huadong Ma FastND: Accelerating Directional Neighbor Discovery for 60-GHz Millimeter-Wave Wireless Networks . . . 2282--2295 Li-On Raviv and Amir Leshem Maximizing Service Reward for Queues With Deadlines . . . . . . . . . . . . . 2296--2308 Chunpu Wang and Chen Feng and Julian Cheng Distributed Join-the-Idle-Queue for Low Latency Cloud Services . . . . . . . . . 2309--2319 Yonglong Zhang and Konstantinos Psounis Consistently High MIMO Rates via Switched-Beam Antennas . . . . . . . . . 2320--2333 Neminath Hubballi and Mayank Swarnkar BitCoding: Network Traffic Classification Through Encoded Bit Level Signatures . . . . . . . . . . . . . . . 2334--2346 Quan Chen and Hong Gao and Zhipeng Cai and Lianglun Cheng and Jianzhong Li Distributed Low-Latency Data Aggregation for Duty-Cycle Wireless Sensor Networks 2347--2360 Vincenzo Sciancalepore and Ilario Filippini and Vincenzo Mancuso and Antonio Capone and Albert Banchs A Multi-Traffic Inter-Cell Interference Coordination Scheme in Dense Cellular Networks . . . . . . . . . . . . . . . . 2361--2375 Xiong Wang and Mehdi Malboubi and Zhihao Pan and Jing Ren and Sheng Wang and Shizhong Xu and Chen-Nee Chuah ProgLIMI: Programmable LInk Metric Identification in Software-Defined Networks . . . . . . . . . . . . . . . . 2376--2389 Yasaman Ghasempour and Muhammad Kumail Haider and Edward W. Knightly Decoupling Beam Steering and User Selection for MU--MIMO 60-GHz WLANs . . 2390--2403 Zhao Zhang and Weili Wu and Jing Yuan and Ding-Zhu Du Breach-Free Sleep-Wakeup Scheduling for Barrier Coverage With Heterogeneous Wireless Sensors . . . . . . . . . . . . 2404--2413 Mengyao Ge and Douglas M. Blough High Throughput and Fair Scheduling for Multi-AP Multiuser MIMO in Dense Wireless Networks . . . . . . . . . . . 2414--2427
Haipeng Dai and Muhammad Shahzad and Alex X. Liu and Meng Li and Yuankun Zhong and Guihai Chen Identifying and Estimating Persistent Items in Data Streams . . . . . . . . . 2429--2442 Ning Wu and Yingjie Bi and Nithin Michael and Ao Tang and John C. Doyle and Nikolai Matni A Control-Theoretic Approach to In-Network Congestion Management . . . . 2443--2456 Kun Chen and Longbo Huang Timely-Throughput Optimal Scheduling With Prediction . . . . . . . . . . . . 2457--2470 Pavlos Sermpezis and Vasileios Kotronis and Petros Gigis and Xenofontas Dimitropoulos and Danilo Cicalese and Alistair King and Alberto Dainotti ARTEMIS: Neutralizing BGP Hijacking Within a Minute . . . . . . . . . . . . 2471--2486 Gek Hong Sim and Sabrina Klos and Arash Asadi and Anja Klein and Matthias Hollick An Online Context-Aware Machine Learning Algorithm for $5$G mmWave Vehicular Communications . . . . . . . . . . . . . 2487--2500 Subhashini Krishnasamy and P. T. Akhil and Ari Arapostathis and Rajesh Sundaresan and Sanjay Shakkottai Augmenting Max-Weight With Explicit Learning for Wireless Scheduling With Switching Costs . . . . . . . . . . . . 2501--2514 Yi Gao and Yuan Jing and Wei Dong UniROPE: Universal and Robust Packet Trajectory Tracing for Software-Defined Networks . . . . . . . . . . . . . . . . 2515--2527 Jiaxiao Zheng and Pablo Caballero and Gustavo de Veciana and Seung Jun Baek and Albert Banchs Statistical Multiplexing and Traffic Shaping Games for Network Slicing . . . 2528--2541 Yuanjie Li and Chunyi Peng and Haotian Deng and Zengwen Yuan and Guan-Hua Tu and Jiayao Li and Songwu Lu and Xi Li Device-Customized Multi-Carrier Network Access on Commodity Smartphones . . . . 2542--2555 Changhee Joo and Atilla Eryilmaz Wireless Scheduling for Information Freshness and Synchrony: Drift-Based Design and Heavy-Traffic Analysis . . . 2556--2568 Arne Ludwig and Szymon Dudycz and Matthias Rost and Stefan Schmid Transiently Policy-Compliant Network Updates . . . . . . . . . . . . . . . . 2569--2582 Michael Borokhovich and Yvonne-Anne Pignolet and Stefan Schmid and Gilles Tredan Load-Optimal Local Fast Rerouting for Dense Networks . . . . . . . . . . . . . 2583--2597 Haichuan Ding and Xuanheng Li and Ying Cai and Beatriz Lorenzo and Yuguang Fang Intelligent Data Transportation in Smart Cities: a Spectrum-Aware Approach . . . 2598--2611 Reuven Cohen and Evgeny Moroshko Sampling-on-Demand in SDN . . . . . . . 2612--2622 Gourav Saha and Alhussein A. Abouzeid and Marja Matinmikko-Blue Online Algorithm for Leasing Wireless Channels in a Three-Tier Spectrum Sharing Framework . . . . . . . . . . . 2623--2636 Igor Kadota and Abhishek Sinha and Elif Uysal-Biyikoglu and Rahul Singh and Eytan Modiano Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks . . . . . . . . . . . . . . . . 2637--2650 Fengxian Guo and Heli Zhang and Hong Ji and Xi Li and Victor C. M. Leung An Efficient Computation Offloading Management Scheme in the Densely Deployed Small Cell Networks With Mobile Edge Computing . . . . . . . . . . . . . 2651--2664 Andres Garcia-Saavedra and Paul Patras and Victor Valls and Xavier Costa-Perez and Douglas J. Leith ORLA/OLAA: Orthogonal Coexistence of LAA and WiFi in Unlicensed Spectrum . . . . 2665--2678 Aakanksha Chowdhery and Kyle Jamieson Aerial Channel Prediction and User Scheduling in Mobile Drone Hotspots . . 2679--2692 Mao Zou and Richard T. B. Ma and Xin Wang and Yinlong Xu On Optimal Service Differentiation in Congested Network Markets . . . . . . . 2693--2706 Xuanyu Cao and Junshan Zhang and H. Vincent Poor Data Center Demand Response With On-Site Renewable Generation: a Bargaining Approach . . . . . . . . . . . . . . . . 2707--2720 Jean-Yves Le Boudec A Theory of Traffic Regulators for Deterministic Networks With Application to Interleaved Regulators . . . . . . . 2721--2733 Cheol-Ho Hong and Kyungwoon Lee and Jaehyun Hwang and Hyunchan Park and Chuck Yoo Kafe: Can OS Kernels Forward Packets Fast Enough for Software Routers? . . . 2734--2747 Yibo Pi and Sugih Jamin and Peter Danzig and Jacob Shaha AP-Atoms: a High-Accuracy Data-Driven Client Aggregation for Global Load Balancing . . . . . . . . . . . . . . . 2748--2761 Lichao Yang and Heli Zhang and Xi Li and Hong Ji and Victor C. M. Leung A Distributed Computation Offloading Strategy in Small-Cell Networks Integrated With Mobile Edge Computing 2762--2773 Xiwen Yu and Hongli Xu and Da Yao and Haibo Wang and Liusheng Huang CountMax: a Lightweight and Cooperative Sketch Measurement for Software-Defined Networks . . . . . . . . . . . . . . . . 2774--2786 Mohamed Lamine Lamali and Nasreddine Fergani and Johanne Cohen Algorithmic and Complexity Aspects of Path Computation in Multi-Layer Networks 2787--2800 Francesca Fossati and Sahar Hoteit and Stefano Moretti and Stefano Secci Fair Resource Allocation in Systems With Complete Information Sharing . . . . . . 2801--2814 Salvatore D'Oro and Francesco Restuccia and Tommaso Melodia and Sergio Palazzo Low-Complexity Distributed Radio Access Network Slicing: Algorithms and Experimental Results . . . . . . . . . . 2815--2828 Anna Engelmann and Wolfgang Bziuk and Admela Jukan and Muriel Medard Exploiting Parallelism With Random Linear Network Coding in High-Speed Ethernet Systems . . . . . . . . . . . . 2829--2842 An Wang and Wentao Chang and Songqing Chen and Aziz Mohaisen Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis 2843--2855 Ping Zhao and Hongbo Jiang and John C. S. Lui and Chen Wang and Fanzi Zeng and Fu Xiao and Zhetao Li P3-LOC: a Privacy-Preserving Paradigm-Driven Framework for Indoor Localization . . . . . . . . . . . . . . 2856--2869 Xudong Wu and Luoyi Fu and Yuhang Yao and Xinzhe Fu and Xinbing Wang and Guihai Chen GLP: a Novel Framework for Group-Level Location Promotion in Geo-Social Networks . . . . . . . . . . . . . . . . 2870--2883
Wei Dong and Chenhong Cao and Xiaoyu Zhang and Yi Gao Understanding Path Reconstruction Algorithms in Multihop Wireless Networks 1--14 Alireza Shams Shafigh and Savo Glisic and Ekram Hossain and Beatriz Lorenzo and Luiz A. DaSilva User-Centric Distributed Spectrum Sharing in Dynamic Network Architectures 15--28 Siddhartha S. Borkotoky and Michael B. Pursley Fountain-Coded Broadcast Distribution in Multiple-Hop Packet Radio Networks . . . 29--41 Jihong Yu and Wei Gong and Jiangchuan Liu and Lin Chen and Kehao Wang On Efficient Tree-Based Tag Search in Large-Scale RFID Systems . . . . . . . . 42--55 Alain Pegatoquet and Trong Nhan Le and Michele Magno A Wake-Up Radio-Based MAC Protocol for Autonomous Wireless Sensor Networks . . 56--70 Wahhab Albazrqaoe and Jun Huang and Guoliang Xing A Practical Bluetooth Traffic Sniffing System: Design, Implementation, and Countermeasure . . . . . . . . . . . . . 71--84 Sladana Josilo and Gyorgy Dan Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems 85--97 Guoming Tang and Huan Wang and Kui Wu and Deke Guo Tapping the Knowledge of Dynamic Traffic Demands for Optimal CDN Design . . . . . 98--111 John Tadrous and Atilla Eryilmaz and Ashutosh Sabharwal Action-Based Scheduling: Leveraging App Interactivity for Scheduler Efficiency 112--125 Jiaqi Liu and Luoyi Fu and Yuhang Yao and Xinzhe Fu and Xinbing Wang and Guihai Chen Modeling, Analysis and Validation of Evolving Networks With Hybrid Interactions . . . . . . . . . . . . . . 126--142 Qingjun Xiao and Shigang Chen and Jia Liu and Guang Cheng and Junzhou Luo A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System . . . . . . . . . 143--158 Jia Liu and Shigang Chen and Qingjun Xiao and Min Chen and Bin Xiao and Lijun Chen Efficient Information Sampling in Multi-Category RFID Systems . . . . . . 159--172 Peng Zhang and Cheng Zhang and Chengchen Hu Fast Data Plane Testing for Software-Defined Networks With RuleChecker . . . . . . . . . . . . . . 173--186 Wenping Liu and Hongbo Jiang and Guoyin Jiang and Jiangchuan Liu and Xiaoqiang Ma and Yufu Jia and Fu Xiao Indoor Navigation With Virtual Graph Representation: Exploiting Peak Intensities of Unmodulated Luminaries 187--200 Xiaofeng Gao and Yuanning Gao and Yichen Zhu and Guihai Chen U2-Tree: a Universal Two-Layer Distributed Indexing Scheme for Cloud Storage System . . . . . . . . . . . . . 201--213 Yong Cui and Yimin Jiang and Zeqi Lai and Xiaomeng Chen and Y. Charlie Hu and Kun Tan and Minglong Dai and Kai Zheng and Yi Li Wireless Network Instabilities in the Wild: Measurement, Applications NonResilience, and OS Remedy . . . . . . 214--230 Xu Zhang and Edward W. Knightly CSIsnoop: Inferring Channel State Information in Multi-User MIMO WLANs . . 231--244 Linsong Cheng and Jiliang Wang Walls Have No Ears: a Non-Intrusive WiFi-Based User Identification System for Mobile Devices . . . . . . . . . . . 245--257 Yigal Bejerano and Chandrashekhar Raman and Chun-Nam Yu and Varun Gupta and Craig Gutterman and Tomas Young and Hugo A. Infante and Yousef M. Abdelmalek and Gil Zussman DyMo: Dynamic Monitoring of Large-Scale LTE-Multicast Systems . . . . . . . . . 258--271 Jianer Zhou and Zhenyu Li and Qinghua Wu and Peter Steenkiste and Steve Uhlig and Jun Li and Gaogang Xie TCP Stalls at the Server Side: Measurement and Mitigation . . . . . . . 272--287 Konstantinos Poularakis and George Iosifidis and Georgios Smaragdakis and Leandros Tassiulas Optimizing Gradual SDN Upgrades in ISP Networks . . . . . . . . . . . . . . . . 288--301 Per Hurtig and Karl-Johan Grinnemo and Anna Brunstrom and Simone Ferlin and Ozgu Alay and Nicolas Kuhn Low-Latency Scheduling in MPTCP . . . . 302--315 Ali Maatouk and Mohamad Assaad and Anthony Ephremides Energy Efficient and Throughput Optimal CSMA Scheme . . . . . . . . . . . . . . 316--329 Meng Jin and Yuan He and Xin Meng and Yilun Zheng and Dingyi Fang and Xiaojiang Chen FlipTracer: Practical Parallel Decoding for Backscatter Communication . . . . . 330--343 Zhenhua Han and Haisheng Tan and Rui Wang and Guihai Chen and Yupeng Li and Francis Chi Moon Lau Energy-Efficient Dynamic Virtual Machine Management in Data Centers . . . . . . . 344--360 Chengwen Luo and Xiao Liu and Wanli Xue and Yiran Shen and Jianqiang Li and Wen Hu and Alex X. Liu Predictable Privacy-Preserving Mobile Crowd Sensing: a Tale of Two Roles . . . 361--374 Yahui Sun and Marcus Brazil and Doreen Thomas and Saman Halgamuge The Fast Heuristic Algorithms and Post-Processing Techniques to Design Large and Low-Cost Communication Networks . . . . . . . . . . . . . . . . 375--388 Sen Liu and Jiawei Huang and Yutao Zhou and Jianxin Wang and Tian He Task-Aware TCP in Data Center Networks 389--404 Taha Bouchoucha and Chen-Nee Chuah and Zhi Ding Topology Inference of Unknown Networks Based on Robust Virtual Coordinate Systems . . . . . . . . . . . . . . . . 405--418 David Lynch and Michael Fenton and David Fagan and Stepan Kucera and Holger Claussen and Michael O'Neill Automated Self-Optimization in Heterogeneous Wireless Communications Networks . . . . . . . . . . . . . . . . 419--432 Satyam Agarwal and Francesco Malandrino and Carla Fabiana Chiasserini and Swades De VNF Placement and Resource Allocation for the Support of Vertical Services in $5$G Networks . . . . . . . . . . . . . 433--446 Li Lu and Jiadi Yu and Yingying Chen and Hongbo Liu and Yanmin Zhu and Linghe Kong and Minglu Li Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones 447--460
Oladele Theophilus Sule and Roberto Rojas-Cessa and Ziqian Dong and Chuan-Bi Lin A Split-Central-Buffered Load-Balancing Clos-Network Switch With In-Order Forwarding . . . . . . . . . . . . . . . 467--476 Mostafa Dehghan and Weibo Chu and Philippe Nain and Don Towsley and Zhi-Li Zhang Sharing Cache Resources Among Content Providers: a Utility-Based Approach . . 477--490 Chang-Heng Wang and Jaime Llorca and Antonia M. Tulino and Tara Javidi Dynamic Cloud Network Control Under Reconfiguration Delay and Cost . . . . . 491--504 Vijay S. Rao and R. Venkatesha Prasad and T. V. Prabhakar and Chayan Sarkar and Madhusudan Koppal and Ignas Niemegeers Understanding and Improving the Performance of Constructive Interference Using Destructive Interference in WSNs 505--517 Xianjin Xia and Shining Li and Yu Zhang and Bingqi Li and Yuanqing Zheng and Tao Gu Enabling Out-of-Band Coordination of Wi-Fi Communications on Smartphones . . 518--531 Irem Koprulu and Yoora Kim and Ness B. Shroff Battle of Opinions Over Evolving Social Networks . . . . . . . . . . . . . . . . 532--545 Liang Song and Chunyan Liu and Hejiao Huang and Hongwei Du and Xiaohua Jia Minimum Connected Dominating Set Under Routing Cost Constraint in Wireless Sensor Networks With Different Transmission Ranges . . . . . . . . . . 546--559 Ahmed Osama Fathy Atya and Zhiyun Qian and Srikanth V. Krishnamurthy and Thomas La Porta and Patrick McDaniel and Lisa M. Marvel Catch Me if You Can: a Closer Look at Malicious Co-Residency on the Cloud . . 560--576 Vaibhav Bajpai and Jurgen Schonwalder A Longitudinal View of Dual-Stacked Websites --- Failures, Latency and Happy Eyeballs . . . . . . . . . . . . . . . . 577--590 Balint Tillman and Athina Markopoulou and Minas Gjoka and Carter T. Buttsc 2K+ Graph Construction Framework: Targeting Joint Degree Matrix and Beyond 591--606 S. Ramakrishnan and Venkatesh Ramaiyan Completely Uncoupled Algorithms for Network Utility Maximization . . . . . . 607--620 Xin Li and Minmei Wang and Huazhe Wang and Ye Yu and Chen Qian Toward Secure and Efficient Communication for the Internet of Things 621--634 Roman Naumann and Stefan Dietzel and Bjorn Scheuermann Push the Barrier: Discrete Event Protocol Emulation . . . . . . . . . . . 635--648 Xiang Li and J. David Smith and Thang N. Dinh and My T. Thai TipTop: Almost Exact Solutions for Influence Maximization in Billion-Scale Networks . . . . . . . . . . . . . . . . 649--661 Pablo Caballero and Albert Banchs and Gustavo De Veciana and Xavier Costa-Perez Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks . . . . . . . . . . . . . . . . 662--675 Ming-Chun Lee and Andreas F. Molisch and Nishanth Sastry and Aravindh Raman Individual Preference Probability Modeling and Parameterization for Video Content in Wireless Caching Networks . . 676--690 Yehuda Afek and Anat Bremler-Barr and Shir Landau Feibish Zero-Day Signature Extraction for High-Volume Attacks . . . . . . . . . . 691--706 Cataldo Basile and Fulvio Valenza and Antonio Lioy and Diego R. Lopez and Antonio Pastor Perales Adding Support for Automatic Enforcement of Security Policies in NFV Networks . . 707--720 Hui Cui and Robert H. Deng and Guilin Wang An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks . . . . . . . . . . . . . . . . 721--733 Bijoy Chand Chatterjee and Fujun He and Eiji Oki and Andrea Fumagalli and Naoaki Yamanaka A Span Power Management Scheme for Rapid Lightpath Provisioning and Releasing in Multi-Core Fiber Networks . . . . . . . 734--747 Qingjun Xiao and Youlin Zhang and Shigang Chen and Min Chen and Jia Liu and Guang Cheng and Junzhou Luo Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System . . . . . . . . 748--762 Peshal Nayak and Michele Garetto and Edward W. Knightly Modeling Multi-User WLANs Under Closed-Loop Traffic . . . . . . . . . . 763--776 Chavoosh Ghasemi and Hamed Yousefi and Kang G. Shin and Beichuan Zhang On the Granularity of Trie-Based Data Structures for Name Lookups and Updates 777--789 Shih-Hao Tseng and Ao Tang and Gagan L. Choudhury and Simon Tse Routing Stability in Hybrid Software-Defined Networks . . . . . . . 790--804 Kai Gao and Qiao Xiang and Xin Wang and Yang Richard Yang and Jun Bi An Objective-Driven On-Demand Network Abstraction for Adaptive Applications 805--818 Qiongzheng Lin and Lei Yang and Chunhui Duan and Zhenlin An Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs . . . . . . . 819--834 Abubakr O. Al-Abbasi and Vaneet Aggarwal and Moo-Ryong Ra Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems . . 835--847 Qian Wang and Jing Huang and Yanjiao Chen and Xin Tian and Qian Zhang Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum . . . 848--861 Kunal Phalak and D. Manjunath and Jayakrishnan Nair Zero Rating: The Power in the Middle . . 862--874 Josu Doncel and Samuli Aalto and Urtzi Ayesta Performance Degradation in Parallel-Server Systems . . . . . . . . 875--888 Shuihai Hu and Yibo Zhu and Peng Cheng and Chuanxiong Guo and Kun Tan and Jitendra Padhye and Kai Chen Tagger: Practical PFC Deadlock Prevention in Data Center Networks . . . 889--902
Michael J. Neely Convergence and Adaptation for Utility Optimal Opportunistic Scheduling . . . . 904--917 Giovanni Chisci and Hesham Elsawy and Andrea Conti and Mohamed-Slim Alouini and Moe Z. Win Uncoordinated Massive Wireless Networks: Spatiotemporal Models and Multiaccess Strategies . . . . . . . . . . . . . . . 918--931 Zicheng Chi and Yan Li and Hongyu Sun and Yao and Ting Zhu Concurrent Cross-Technology Communication Among Heterogeneous IoT Devices . . . . . . . . . . . . . . . . 932--947 Jia Liu and Bin Xiao and Xuan Liu and Kai Bu and Lijun Chen and Changhai Nie Efficient Polling-Based Information Collection in RFID Systems . . . . . . . 948--961 Abbas Kiani and Nirwan Ansari and Abdallah Khreishah Hierarchical Capacity Provisioning for Fog Computing . . . . . . . . . . . . . 962--971 Jiaxi Gu and Jiliang Wang and Zhiwen Yu and Kele Shen Traffic-Based Side-Channel Attack in Video Streaming . . . . . . . . . . . . 972--985 Meng Zhang and Lin Gao and Jianwei Huang and Michael L. Honig Hybrid Pricing for Mobile Collaborative Internet Access . . . . . . . . . . . . 986--999 Marco Di Bartolomeo and Valentino Di Donato and Maurizio Pizzonia and Claudio Squarcella and Massimo Rimondini Extracting Routing Events From Traceroutes: a Matter of Empathy . . . . 1000--1012 Mostafa Dehghan and Laurent Massoulie and Don Towsley and Daniel Sadoc Menasche and Y. C. Tay A Utility Optimization Approach to Network Cache Design . . . . . . . . . . 1013--1027 Tie Qiu and Jie Liu and Weisheng Si and Dapeng Oliver Wu Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks . . 1028--1042 Semih Cayci and Atilla Eryilmaz Optimal Learning for Dynamic Coding in Deadline-Constrained Multi-Channel Networks . . . . . . . . . . . . . . . . 1043--1054 Linghe Kong and Yifeng Cao and Liang He and Guihai Chen and Min-You Wu and Tian He Multi-Rate Selection in ZigBee . . . . . 1055--1068 Wenchao Jiang and Zhimeng Yin and Ruofeng Liu and Zhijun Li and Song Min Kim and Tian He Boosting the Bitrate of Cross-Technology Communication on Commodity IoT Devices 1069--1083 Hirotada Honda and Hiroshi Saito Nation-Wide Disaster Avoidance Control Against Heavy Rain . . . . . . . . . . . 1084--1097 Zongzong Lin and Wenlian Lu and Shouhuai Xu Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent . . . . . . . . . . . . . . . 1098--1111 Kung-Jui Pai and Jou-Ming Chang Dual-CISTs: Configuring a Protection Routing on Some Cayley Networks . . . . 1112--1123 Zonghui Li and Hai Wan and Zaiyu Pang and Qiubo Chen and Yangdong Deng and Xibin Zhao and Yue Gao and Xiaoyu Song and Ming Gu An Enhanced Reconfiguration for Deterministic Transmission in Time-Triggered Networks . . . . . . . . 1124--1137 Anis Elgabli and Muhamad Felemban and Vaneet Aggarwal GroupCast: Preference-Aware Cooperative Video Streaming With Scalable Video Coding . . . . . . . . . . . . . . . . . 1138--1150 Duong Tung Nguyen and Long Bao Le and Vijay K. Bhargava A Market-Based Framework for Multi-Resource Allocation in Fog Computing . . . . . . . . . . . . . . . 1151--1164 Federico Chiariotti and Stepan Kucera and Andrea Zanella and Holger Claussen Analysis and Design of a Latency Control Protocol for Multi-Path Data Delivery With Pre-Defined QoS Guarantees . . . . 1165--1178 Xiulong Liu and Jiannong Cao and Yanni Yang and Wenyu Qu and Xibin Zhao and Keqiu Li and Didi Yao Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs . . . . . . . . . . 1179--1191 Thi-Minh Nguyen and Andre Girard and Catherine Rosenberg and Serge Fdida Routing via Functions in Virtual Networks: The Curse of Choices . . . . . 1192--1205 Jaehyun Nam and Hyeonseong Jo and Yeonkeun Kim and Phillip Porras and Vinod Yegneswaran and Seungwon Shin Operator-Defined Reconfigurable Network OS for Software-Defined Networks . . . . 1206--1219 Kaiping Xue and Peixuan He and Xiang Zhang and Qiudong Xia and David S. L. Wei and Hao Yue and Feng Wu A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks . . . . . . 1220--1233 Junjie Xie and Deke Guo and Chen Qian and Lei Liu and Bangbang Ren and Honghui Chen Validation of Distributed SDN Control Plane Under Uncertain Failures . . . . . 1234--1247 Ahmed M. Bedewy and Yin Sun and Ness B. Shroff The Age of Information in Multihop Networks . . . . . . . . . . . . . . . . 1248--1257 Han Deng and Tao Zhao and I-Hong Hou Online Routing and Scheduling With Capacity Redundancy for Timely Delivery Guarantees in Multihop Networks . . . . 1258--1271 Shiqiang Wang and Rahul Urgaonkar and Murtaza Zafer and Ting He and Kevin Chan and Kin K. Leung Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process . . . . . . . . . . . . . . . . 1272--1288 G. Enrico Santagati and Tommaso Melodia Corrections to ``A Software-Defined Ultrasonic Networking Framework for Wearable Devices'' . . . . . . . . . . . 1289--1289
Giovanni Chisci and Andrea Conti and Lorenzo Mucchi and Moe Z. Win Intrinsic Secrecy in Inhomogeneous Stochastic Networks . . . . . . . . . . 1291--1304 Anvitha Nandigam and Suraj Jog and D. Manjunath and Jayakrishnan Nair and Balakrishna J. Prabhu Sharing Within Limits: Partial Resource Pooling in Loss Systems . . . . . . . . 1305--1318 Tianheng Wang and Andrea Conti and Moe Z. Win Network Navigation With Scheduling: Distributed Algorithms . . . . . . . . . 1319--1329 Chien-Sheng Yang and Ramtin Pedarsani and A. Salman Avestimehr Communication-Aware Scheduling of Serial Tasks for Dispersed Computing . . . . . 1330--1343 George Trimponias and Yan Xiao and Xiaorui Wu and Hong Xu and Yanhui Geng Node-Constrained Traffic Engineering: Theory and Applications . . . . . . . . 1344--1358 Igor Kadota and Abhishek Sinha and Eytan Modiano Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints . . . . . . . . . 1359--1372 Shengchao Liu and Jianping Weng and Jessie Hui Wang and Changqing An and Yipeng Zhou and Jilong Wang An Adaptive Online Scheme for Scheduling and Resource Enforcement in Storm . . . 1373--1386 Bruno Y. L. Kimura and Demetrius C. S. F. Lima and Leandro A. Villas and Antonio A. F. Loureiro Interpath Contention in MultiPath TCP Disjoint Paths . . . . . . . . . . . . . 1387--1400 Vishal Shrivastav and Ki Suh Lee and Han Wang and Hakim Weatherspoon Globally Synchronized Time via Datacenter Networks . . . . . . . . . . 1401--1416 James Daly and Valerio Bruschi and Leonardo Linguaglossa and Salvatore Pontarelli and Dario Rossi and Jerome Tollet and Eric Torng and Andrew Yourtchenko TupleMerge: Fast Software Packet Processing for Online Packet Classification . . . . . . . . . . . . . 1417--1431 Ran Ben Basat and Xiaoqi Chen and Gil Einziger and Roy Friedman and Yaron Kassner Randomized Admission Policy for Efficient Top-$k$, Frequency, and Volume Estimation . . . . . . . . . . . . . . . 1432--1445 Yahia Shabara and C. Emre Koksal and Eylem Ekici Beam Discovery Using Linear Block Codes for Millimeter Wave Communication Networks . . . . . . . . . . . . . . . . 1446--1459 Zhizhen Zhong and Nan Hua and Massimo Tornatore and Jialong Li and Yanhe Li and Xiaoping Zheng and Biswanath Mukherjee Provisioning Short-Term Traffic Fluctuations in Elastic Optical Networks 1460--1473 Miroslaw Klinkowski and Krzysztof Walkowiak An Efficient Optimization Framework for Solving RSSA Problems in Spectrally and Spatially Flexible Optical Networks . . 1474--1486 Jie Chuai and Victor O. K. Li An Analytical Framework for Resource Allocation Between Data and Delayed Network State Information . . . . . . . 1487--1500 Hao Yu and Michael J. Neely Learning-Aided Optimization for Energy-Harvesting Devices With Outdated State Information . . . . . . . . . . . 1501--1514 Xiaonan Zhang and Pei Huang and Linke Guo and Yuguang Fang Social-Aware Energy-Efficient Data Offloading With Strong Stability . . . . 1515--1528 Thibaut Stimpfling and Normand Belanger and J. M. Pierre Langlois and Yvon Savaria SHIP: a Scalable High-Performance IPv6 Lookup Algorithm That Exploits Prefix Characteristics . . . . . . . . . . . . 1529--1542 Vincenzo Sciancalepore and Xavier Costa-Perez and Albert Banchs RL-NSB: Reinforcement Learning-Based $5$G Network Slice Broker . . . . . . . 1543--1557 Yuedong Xu and Zhujun Xiao and Tianyu Ni and Jessie Hui Wang and Xin Wang and Eitan Altman On The Robustness of Price-Anticipating Kelly Mechanism . . . . . . . . . . . . 1558--1571 Arjun Bakshi and Lu Chen and Kannan Srinivasan and C. Emre Koksal and Atilla Eryilmaz EMIT: an Efficient MAC Paradigm for the Internet of Things . . . . . . . . . . . 1572--1583 Cheng-Shang Chang and Duan-Shin Lee and Chun Wang Asynchronous Grant-Free Uplink Transmissions in Multichannel Wireless Networks With Heterogeneous QoS Guarantees . . . . . . . . . . . . . . . 1584--1597 Yongquan Fu and Dongsheng Li and Pere Barlet-Ros and Chun Huang and Zhen Huang and Siqi Shen and Huayou Su A Skewness-Aware Matrix Factorization Approach for Mesh-Structured Cloud Services . . . . . . . . . . . . . . . . 1598--1611 Yong Cui and Ningwei Dai and Zeqi Lai and Minming Li and Zhenhua Li and Yuming Hu and Kui Ren and Yuchi Chen TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints . . 1612--1628 Ahmed Boubrima and Walid Bechkit and Herve Rivano On the Deployment of Wireless Sensor Networks for Air Quality Mapping: Optimization Models and Algorithms . . . 1629--1642 Ziyao Zhang and Liang Ma and Kin K. Leung and Franck Le and Sastry Kompella and Leandros Tassiulas How Advantageous Is It? An Analytical Study of Controller-Assisted Path Construction in Distributed SDN . . . . 1643--1656 Arpan Mukhopadhyay and Nidhi Hegde and Marc Lelarge Asymptotics of Replication and Matching in Large Caching Systems . . . . . . . . 1657--1668 Junyang Shi and Mo Sha and Zhicheng Yang Distributed Graph Routing and Scheduling for Industrial Wireless Sensor-Actuator Networks . . . . . . . . . . . . . . . . 1669--1682 Nikolaos Liakopoulos and Georgios S. Paschos and Thrasyvoulos Spyropoulos Robust Optimization Framework for Proactive User Association in UDNs: a Data-Driven Approach . . . . . . . . . . 1683--1695 Christos Liaskos and Ageliki Tsioliaridou and Shuai Nie and Andreas Pitsillides and Sotiris Ioannidis and Ian F. Akyildiz On the Network-Layer Modeling and Configuration of Programmable Wireless Environments . . . . . . . . . . . . . . 1696--1713 Yu Zhou and Jun Bi and Cheng Zhang and Bingyang Liu and Zhaogeng Li and Yangyang Wang and Mingli Yu P4DB: On-the-Fly Debugging for Programmable Data Planes . . . . . . . . 1714--1727 Siddhartha Satpathi and Supratim Deb and R. Srikant and He Yan Learning Latent Events From Network Message Logs . . . . . . . . . . . . . . 1728--1741 Fujun He and Takehiro Sato and Eiji Oki Optimization Model for Backup Resource Allocation in Middleboxes With Importance . . . . . . . . . . . . . . . 1742--1755 Francesco Malandrino and Carla Fabiana Chiasserini and Claudio Casetti and Giada Landi and Marco Capitani An Optimization-Enhanced MANO for Energy-Efficient $5$G Networks . . . . . 1756--1769
Haisheng Tan and Shaofeng H.-C. Jiang and Yupeng Li and Xiang-Yang Li and Chenzi Zhang and Zhenhua Han and Francis Chi Moon Lau Joint Online Coflow Routing and Scheduling in Data Center Networks . . . 1771--1786 Cesar Ghali and Gene Tsudik and Ersin Uzun In Content We Trust: Network-Layer Trust in Content-Centric Networking . . . . . 1787--1800 Huikang Li and Yi Gao and Wei Dong and Chun Chen Preferential Link Tomography in Dynamic Networks . . . . . . . . . . . . . . . . 1801--1814 Pan Zhou and Jie Xu and Wei Wang and Yuchong Hu and Dapeng Oliver Wu and Shouling Ji Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack . . . . . . . . . . . . . 1815--1829 Majid Khabbazian and Keyvan Gharouni Saffar The Gain of Energy Accumulation in Multi-Hop Wireless Network Broadcast . . 1830--1844 Tong Yang and Haowei Zhang and Jinyang Li and Junzhi Gong and Steve Uhlig and Shigang Chen and Xiaoming Li HeavyKeeper: an Accurate Algorithm for Finding Top-$k$ Elephant Flows . . . . . 1845--1858 Jiaqi Zheng and Hong Xu and Xiaojun Zhu and Guihai Chen and Yanhui Geng Sentinel: Failure Recovery in Centralized Traffic Engineering . . . . 1859--1872 Xiulong Liu and Xin Xie and Shangguang Wang and Jia Liu and Didi Yao and Jiannong Cao and Keqiu Li Efficient Range Queries for Large-Scale Sensor-Augmented RFID Systems . . . . . 1873--1886 Qing He and Gyorgy Dan and Viktoria Fodor Joint Assignment and Scheduling for Minimizing Age of Correlated Information 1887--1900 Dalia Popescu and Philippe Jacquet and Bernard Mans and Robert Dumitru and Andra Pastrav and Emanuel Puschita Information Dissemination Speed in Delay Tolerant Urban Vehicular Networks in a Hyperfractal Setting . . . . . . . . . . 1901--1914 H. V. Kalpanie Mendis and Indika A. M. Balapuwaduge and Frank Y. Li Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain . . . . . . . . . . . . . . 1915--1930 Ruozhou Yu and Guoliang Xue and Xiang Zhang Provisioning QoS-Aware and Robust Applications in Internet of Things: a Network Perspective . . . . . . . . . . 1931--1944 Xiang-Yang Li and Huiqi Liu and Lan Zhang and Zhenan Wu and Yaochen Xie and Ge Chen and Chunxiao Wan and Zhongwei Liang Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint . . . . . . . . . . . . . . 1945--1958 Xiaowen Gong and Ness B. Shroff Truthful Mobile Crowdsensing for Strategic Users With Private Data Quality . . . . . . . . . . . . . . . . 1959--1972 Zhenjie Yang and Yong Cui and Xin Wang and Yadong Liu and Minming Li and Shihan Xiao and Chuming Li Cost-Efficient Scheduling of Bulk Transfers in Inter-Datacenter WANs . . . 1973--1986 Pablo Garrido and Douglas J. Leith and Ramon Aguero Joint Scheduling and Coding for Low In-Order Delivery Delay Over Lossy Paths With Delayed Feedback . . . . . . . . . 1987--2000 Arjun Roy and Rajdeep Das and Hongyi Zeng and Jasmeet Bagga and Alex C. Snoeren Understanding the Limits of Passive Realtime Datacenter Fault Detection and Localization . . . . . . . . . . . . . . 2001--2014 Xuya Jia and Dan Li and Jing Zhu and Yong Jiang Metro: an Efficient Traffic Fast Rerouting Scheme With Low Overhead . . . 2015--2027 Christos Pappas and Taeho Lee and Raphael M. Reischuk and Pawel Szalachowski and Adrian Perrig Network Transparency for Better Internet Security . . . . . . . . . . . . . . . . 2028--2042 Kang Yang and Tianzhang Xing and Yang Liu and Zhenjiang Li and Xiaoqing Gong and Xiaojiang Chen and Dingyi Fang cDeepArch: a Compact Deep Neural Network Architecture for Mobile Sensing . . . . 2043--2055 Reza Motamedi and Bahador Yeganeh and Balakrishnan Chandrasekaran and Reza Rejaie and Bruce M. Maggs and Walter Willinger On Mapping the Interconnections in Today's Internet . . . . . . . . . . . . 2056--2070 Matthias Rost and Stefan Schmid Virtual Network Embedding Approximations: Leveraging Randomized Rounding . . . . . . . . . . . . . . . . 2071--2084 Mikhail Hayhoe and Fady Alajaji and Bahman Gharesifard Curing Epidemics on Networks Using a Polya Contagion Model . . . . . . . . . 2085--2097 Reuven Cohen and Yuval Nezri Cardinality Estimation in a Virtualized Network Device Using Online Machine Learning . . . . . . . . . . . . . . . . 2098--2110 George Darzanos and Iordanis Koutsopoulos and George D. Stamoulis Cloud Federations: Economics, Games and Benefits . . . . . . . . . . . . . . . . 2111--2124 Luca Baldesi and Athina Markopoulou and Carter T. Buttsc Spectral Graph Forge: a Framework for Generating Synthetic Graphs With a Target Modularity . . . . . . . . . . . 2125--2136 Benny Van Houdt Randomized Work Stealing Versus Sharing in Large-Scale Systems With Non-Exponential Job Sizes . . . . . . . 2137--2149 Kate Ching-Ju Lin and Kai-Cheng Hsu and Hung-Yu Wei Inter-Client Interference Cancellation for Full-Duplex Networks With Half-Duplex Clients . . . . . . . . . . 2150--2163 Kaiming Shen and Wei Yu and Licheng Zhao and Daniel P. Palomar Optimization of MIMO Device-to-Device Networks via Matrix Fractional Programming: a Minorization--Maximization Approach . . 2164--2177
Alex X. Liu and Eric Norige A De-Compositional Approach to Regular Expression Matching for Network Security 2179--2191 Orly Avner and Shie Mannor Multi-User Communication Networks: a Coordinated Multi-Armed Bandit Approach 2192--2207 Haiming Jin and Baoxiang He and Lu Su and Klara Nahrstedt and Xinbing Wang Data-Driven Pricing for Sensing Effort Elicitation in Mobile Crowd Sensing Systems . . . . . . . . . . . . . . . . 2208--2221 Kun Xie and Xiangge Wang and Xin Wang and Yuxiang Chen and Gaogang Xie and Yudian Ouyang and Jigang Wen and Jiannong Cao and Dafang Zhang Accurate Recovery of Missing Network Measurement Data With Localized Tensor Completion . . . . . . . . . . . . . . . 2222--2235 Tong Yang and Jie Jiang and Peng Liu and Qun Huang and Junzhi Gong and Yang Zhou and Rui Miao and Xiaoming Li and Steve Uhlig Adaptive Measurements Using One Elastic Sketch . . . . . . . . . . . . . . . . . 2236--2251 Pedro Reviriego and Ori Rottenstreich The Tandem Counting Bloom Filter --- It Takes Two Counters to Tango . . . . . . 2252--2265 Mehmet Fatih Akta\cs and Emina Soljanin Straggler Mitigation at Scale . . . . . 2266--2279 Daqing Yun and Chase Q. Wu and Nageswara S. V. Rao and Rajkumar Kettimuthu Advising Big Data Transfer Over Dedicated Connections Based on Profiling Optimization . . . . . . . . . . . . . . 2280--2293 Haiqin Wu and Liangmin Wang and Guoliang Xue and Jian Tang and Dejun Yang Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing . . . . . 2294--2307 Guo Chen and Yuanwei Lu and Bojie Li and Kun Tan and Yongqiang Xiong and Peng Cheng and Jiansong Zhang and Thomas Moscibroda MP-RDMA: Enabling RDMA With Multi-Path Transport in Datacenters . . . . . . . . 2308--2323 Chen Chen and Lei Liu and Tie Qiu and Dapeng Oliver Wu and Zhiyuan Ren Delay-Aware Grid-Based Geographic Routing in Urban VANETs: a Backbone Approach . . . . . . . . . . . . . . . . 2324--2337 Jinbin Hu and Jiawei Huang and Wenjun Lv and Yutao Zhou and Jianxin Wang and Tian He CAPS: Coding-Based Adaptive Packet Spraying to Reduce Flow Completion Time in Data Center . . . . . . . . . . . . . 2338--2353 Qian Chen and Xiao Juan Zhang and Wei Lih Lim and Yuen Sam Kwok and Sumei Sun High Reliability, Low Latency and Cost Effective Network Planning for Industrial Wireless Mesh Networks . . . 2354--2362 Francesco Malandrino and Carla Fabiana Chiasserini and Gil Einziger and Gabriel Scalosub Reducing Service Deployment Cost Through VNF Sharing . . . . . . . . . . . . . . 2363--2376 Mauro Cociglio and Giuseppe Fioccola and Guido Marchetto and Amedeo Sapio and Riccardo Sisto Multipoint Passive Monitoring in Packet Networks . . . . . . . . . . . . . . . . 2377--2390 Ping Zhao and Hongbo Jiang and Jie Li and Fanzi Zeng and Xiao Zhu and Kun Xie and Guanglin Zhang Synthesizing Privacy Preserving Traces: Enhancing Plausibility With Social Networks . . . . . . . . . . . . . . . . 2391--2404 Anura P. Jayasumana and Randy Paffenroth and Gunjan Mahindre and Sridhar Ramasamy and Kelum Gajamannage Network Topology Mapping From Partial Virtual Coordinates and Graph Geodesics 2405--2417 Yang Liu and Bo Li and Brian D. O. Anderson and Guodong Shi Clique Gossiping . . . . . . . . . . . . 2418--2431 Sepideh Nazemi and Kin K. Leung and Ananthram Swami Distributed Optimization Framework for In-Network Data Processing . . . . . . . 2432--2443 Elaine Y.-N. Sun and Hsiao-Chun Wu and Scott C.-H. Huang Theoretical Analysis of Various Software-Defined Multiplexing Codes . . 2444--2457 Han Zhang and Haijun Geng and Yahui Li and Xia Yin and Xingang Shi and Zhiliang Wang and Qianhong Wu and Jianwei Liu DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs . . . . . . . . . . . . . 2458--2471 Zhenhua Han and Haisheng Tan and Xiang-Yang Li and Shaofeng H.-C. Jiang and Yupeng Li and Francis C. M. Lau OnDisc: Online Latency-Sensitive Job Dispatching and Scheduling in Heterogeneous Edge-Clouds . . . . . . . 2472--2485
Haipeng Dai and Meng Li and Alex X. Liu and Jiaqi Zheng and Guihai Chen Finding Persistent Items in Distributed Datasets . . . . . . . . . . . . . . . . 1--14 Rajat Talak and Sertac Karaman and Eytan Modiano Optimizing Information Freshness in Wireless Networks Under General Interference Constraints . . . . . . . . 15--28 G. Enrico Santagati and Neil Dave and Tommaso Melodia Design and Performance Evaluation of an Implantable Ultrasonic Networking Platform for the Internet of Medical Things . . . . . . . . . . . . . . . . . 29--42 Yan Qiao and Jun Jiao and Xinhong Cui and Yuan Rao Robust Loss Inference in the Presence of Noisy Measurements and Hidden Fault Diagnosis . . . . . . . . . . . . . . . 43--56 Jia Zhao and Jiangchuan Liu and Haiyang Wang and Chi Xu and Wei Gong and Changqiao Xu Measurement, Analysis, and Enhancement of Multipath TCP Energy Efficiency for Datacenters . . . . . . . . . . . . . . 57--70 Guocheng Liao and Xu Chen and Jianwei Huang Prospect Theoretic Analysis of Privacy-Preserving Mechanism . . . . . . 71--83 Seokhyun Kim and Kimin Lee and Yeonkeun Kim and Jinwoo Shin and Seungwon Shin and Song Chong Dynamic Control for On-Demand Interference-Managed WLAN Infrastructures . . . . . . . . . . . . 84--97 Danfeng Shan and Fengyuan Ren and Peng Cheng and Ran Shu and Chuanxiong Guo Observing and Mitigating Micro-Burst Traffic in Data Center Networks . . . . 98--111 Lorenzo Saino and Ioannis Psaras and Emilio Leonardi and George Pavlou Load Imbalance and Caching Performance of Sharded Systems . . . . . . . . . . . 112--125 Xiulong Liu and Sheng Chen and Jia Liu and Wenyu Qu and Fengjun Xiao and Alex X. Liu and Jiannong Cao and Jiangchuan Liu Fast and Accurate Detection of Unknown Tags for RFID Systems --- Hash Collisions are Desirable . . . . . . . . 126--139 K. P. Naveen and Anurag Kumar Coverage in One-Dimensional Wireless Networks With Infrastructure Nodes and Relay Extensions . . . . . . . . . . . . 140--153 Shuyi Chen and Xiqing Liu and Tianyu Zhao and Hsiao-Hwa Chen and Weixiao Meng Performance Analysis of Joint Transmission Schemes in Ultra-Dense Networks --- A Unified Approach . . . . 154--167 Miralem Mehic and Peppino Fazio and Stefan Rass and Oliver Maurhart and Momtchil Peev and Andreas Poppe and Jan Rozhon and Marcin Niemiec and Miroslav Voznak A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks . . . . . . . 168--181 Ashwin Ganesan Performance Guarantees of Distributed Algorithms for QoS in Wireless Ad Hoc Networks . . . . . . . . . . . . . . . . 182--195 Zongqing Lu and Kevin Chan and Rahul Urgaonkar and Shiliang Pu and Thomas La Porta NetVision: On-Demand Video Processing in Wireless Networks . . . . . . . . . . . 196--209 Minh Pham and Doan B. Hoang and Zenon Chaczko Congestion-Aware and Energy-Aware Virtual Network Embedding . . . . . . . 210--223 Caixia Kou and Dedong Hu and Jianhua Yuan and Wenbao Ai Bisection and Exact Algorithms Based on the Lagrangian Dual for a Single-Constrained Shortest Path Problem 224--233 Xiong Wang and Qi Deng and Jing Ren and Mehdi Malboubi and Sheng Wang and Shizhong Xu and Chen-Nee Chuah The Joint Optimization of Online Traffic Matrix Measurement and Traffic Engineering For Software-Defined Networks . . . . . . . . . . . . . . . . 234--247 Yannis Thomas and Merkourios Karaliopoulos and George Xylomenos and George C. Polyzos Low Latency Friendliness for Multipath TCP . . . . . . . . . . . . . . . . . . 248--261 Sangeeta Bhattacharjee and Tamaghna Acharya and Uma Bhattacharya Energy-Efficient Multicasting in Hybrid Cognitive Small Cell Networks: a Cross-Layer Approach . . . . . . . . . . 262--274 Levente Csikor and Márk Szalay and Gábor Rétvári and Gergely Pongrácz and Dimitrios P. Pezaros and László Toka Transition to SDN is HARMLESS: Hybrid Architecture for Migrating Legacy Ethernet Switches to SDN . . . . . . . . 275--288 Alija Pa\vsi\'c and Péter Babarczi and János Tapolcai and Erika R. Bérczi-Kovács and Zoltán Király and Lajos Rónyai Minimum Cost Survivable Routing Algorithms for Generalized Diversity Coding . . . . . . . . . . . . . . . . . 289--300 Xiuzhen Guo and Yuan He and Xiaolong Zheng and Liangcheng Yu and Omprakash Gnawali ZigFi: Harnessing Channel State Information for Cross-Technology Communication . . . . . . . . . . . . . 301--311 Ze Yang and Kwan L. Yeung SDN Candidate Selection in Hybrid IP/SDN Networks for Single Link Failure Protection . . . . . . . . . . . . . . . 312--321 Jiachen Xue and Muhammad Usama Chaudhry and Balajee Vamanan and T. N. Vijaykumar and Mithuna Thottethodi Dart: Divide and Specialize for Fast Response to Congestion in RDMA-Based Datacenter Networks . . . . . . . . . . 322--335 Bin Tang and Xiaoliang Wang and Cam-Tu Nguyen and Baoliu Ye and Sanglu Lu Construction of Subexponential-Size Optical Priority Queues With Switches and Fiber Delay Lines . . . . . . . . . 336--346 Amr Albanna and Homayoun Yousefi'Zadeh Congestion Minimization of LTE Networks: a Deep Learning Approach . . . . . . . . 347--359 Luoyi Fu and Jiapeng Zhang and Shuaiqi Wang and Xinyu Wu and Xinbing Wang and Guihai Chen De-Anonymizing Social Networks With Overlapping Community Structure . . . . 360--375 Teng Liu and Alhussein A. Abouzeid and A. Agung Julius Traffic Flow Control in Vehicular Multi-Hop Networks With Data Caching and Infrastructure Support . . . . . . . . . 376--386 Takuro Fukunaga Adaptive Algorithm for Finding Connected Dominating Sets in Uncertain Graphs . . 387--398
Qingjun Xiao and Shigang Chen and You Zhou and Junzhou Luo Estimating Cardinality for Arbitrarily Large Data Stream With Improved Memory Efficiency . . . . . . . . . . . . . . . 433--446 Wei Dong and Yi Gao and Chenhong Cao and Xiaoyu Zhang and Wenbin Wu Universal Path Tracing for Large-Scale Sensor Networks . . . . . . . . . . . . 447--460 Jona Beysens and Qing Wang and Ander Galisteo and Domenico Giustiniano and Sofie Pollin A Cell-Free Networking System With Visible Light . . . . . . . . . . . . . 461--476 Arjun Anand and Gustavo de Veciana and Sanjay Shakkottai Joint Scheduling of URLLC and eMBB Traffic in $5$G Wireless Networks . . . 477--490 Alejandro Cohen and Asaf Cohen and Omer Gurewitz Efficient Data Collection Over Multiple Access Wireless Sensors Network . . . . 491--504 Tingwei Liu and John C. S. Lui FAVE: a Fast and Efficient Network Flow AVailability Estimation Method With Bounded Relative Error . . . . . . . . . 505--518 Mingjun Xiao and Guoju Gao and Jie Wu and Sheng Zhang and Liusheng Huang Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing . . . . 519--532 Matthew Clark and Konstantinos Psounis Optimizing Primary User Privacy in Spectrum Sharing Systems . . . . . . . . 533--546 Ge Wang and Haofan Cai and Chen Qian and Jinsong Han and Shouqian Shi and Xin Li and Han Ding and Wei Xi and Jizhong Zhao Hu-Fu: Replay-Resilient RFID Authentication . . . . . . . . . . . . . 547--560 Martino Trevisan and Danilo Giordano and Idilio Drago and Maurizio Matteo Munaf\`o and Marco Mellia Five Years at the Edge: Watching Internet From the ISP Network . . . . . 561--574 Yilong Hui and Zhou Su and Tom H. Luan Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks . . . . . . . . . . . . . . . . 575--587 Novella Bartolini and Ting He and Viviana Arrigoni and Annalisa Massini and Federico Trombetti and Hana Khamfroush On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography . . . . . . . . . . . . . . . 588--601 Wei Wang and Shiyue He and Qian Zhang and Tao Jiang Enabling Low-Power OFDM for IoT by Exploiting Asymmetric Clock Rates . . . 602--611 Yongrui Chen and Shuai Wang and Zhijun Li and Tian He Reliable Physical-Layer Cross-Technology Communication With Emulation Error Correction . . . . . . . . . . . . . . . 612--624 Georgios S. Paschos and Apostolos Destounis and George Iosifidis Online Convex Optimization for Caching Networks . . . . . . . . . . . . . . . . 625--638 Sameer G. Kulkarni and Wei Zhang and Jinho Hwang and Shriram Rajagopalan and K. K. Ramakrishnan and Timothy Wood and Mayutan Arumaithurai and Xiaoming Fu NFVnice: Dynamic Backpressure and Scheduling for NFV Service Chains . . . 639--652 Wenjia Wei and Kaiping Xue and Jiangping Han and David S. L. Wei and Peilin Hong Shared Bottleneck-Based Congestion Control and Packet Scheduling for Multipath TCP . . . . . . . . . . . . . 653--666 Sla\dbarana Jo\vsilo and György Dán Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing 667--680 Yahui Sun and Daniel Rehfeldt and Marcus Brazil and Doreen Thomas and Saman Halgamuge A Physarum-Inspired Algorithm for Minimum-Cost Relay Node Placement in Wireless Sensor Networks . . . . . . . . 681--694 Sameer G. Kulkarni and Guyue Liu and K. K. Ramakrishnan and Mayutan Arumaithurai and Timothy Wood and Xiaoming Fu REINFORCE: Achieving Efficient Failure Resiliency for Network Function Virtualization-Based Services . . . . . 695--708 Ajay Badita and Parimal Parag and Vaneet Aggarwal Optimal Server Selection for Straggler Mitigation . . . . . . . . . . . . . . . 709--721 Jaya Prakash Champati and Hussein Al-Zubaidy and James Gross Transient Analysis for Multihop Wireless Networks Under Static Routing . . . . . 722--735 Michael Lin and Novella Bartolini and Michael Giallorenzo and Thomas F. La Porta On Interference Aware Power Adjustment and Scheduling in Femtocell Networks . . 736--749 Sen Lin and Junshan Zhang and Lei Ying Crowdsensing for Spectrum Discovery: a Waze-Inspired Design via Smartphone Sensing . . . . . . . . . . . . . . . . 750--763 Tingjun Chen and Jelena Diakonikolas and Javad Ghaderi and Gil Zussman Hybrid Scheduling in Heterogeneous Half- and Full-Duplex Wireless Networks . . . 764--777 Hani Sami and Azzam Mourad and Wassim El-Hajj Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services . . . . . . 778--790 Matthias Rost and Stefan Schmid On the Hardness and Inapproximability of Virtual Network Embeddings . . . . . . . 791--803 Xijian Zhong and Yan Guo and Ning Li and Yancheng Chen Joint Optimization of Relay Deployment, Channel Allocation, and Relay Assignment for UAVs-Aided D$2$D Networks . . . . . 804--817 Ali Maatouk and Mohamad Assaad and Anthony Ephremides On the Age of Information in a CSMA Environment . . . . . . . . . . . . . . 818--831 Haibo Wang and Jessie Hui Wang and Jilong Wang and Weizhen Dang and Jing'an Xue and Fenghua Li and Jinzhe Shan Squeezing the Gap: an Empirical Study on DHCP Performance in a Large-Scale Wireless Network . . . . . . . . . . . . 832--845
Kun Xie and Yuxiang Chen and Xin Wang and Gaogang Xie and Jiannong Cao and Jigang Wen Accurate and Fast Recovery of Network Monitoring Data: a GPU Accelerated Matrix Completion . . . . . . . . . . . 958--971 Jie Wang and Wenye Wang and Cliff Wang Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon . . . . . . . . . . . . . . . . 972--985 Gioacchino Tangari and Marinos Charalambides and Daphne Tuncer and George Pavlou Accuracy-Aware Adaptive Traffic Monitoring for Software Dataplanes . . . 986--1001 Yongce Chen and Yan Huang and Yi Shi and Y. Thomas Hou and Wenjing Lou and Sastry Kompella On DoF-Based Interference Cancellation Under General Channel Rank Conditions 1002--1016 Avinash Mohan and Aditya Gopalan and Anurag Kumar Reduced-State, Optimal Scheduling for Decentralized Medium Access Control of a Class of Wireless Networks . . . . . . . 1017--1032 Meng Li and Haipeng Dai and Xiaoyu Wang and Rui Xia and Alex X. Liu and Guihai Chen Thresholded Monitoring in Distributed Data Streams . . . . . . . . . . . . . . 1033--1046 Konstantinos Poularakis and Jaime Llorca and Antonia M. Tulino and Ian Taylor and Leandros Tassiulas Service Placement and Request Routing in MEC Networks With Storage, Computation, and Communication Constraints . . . . . 1047--1060 Ziyue Luo and Chuan Wu An Online Algorithm for VNF Service Chain Scaling in Datacenters . . . . . . 1061--1073 Juan Brenes and Alberto García-Martínez and Marcelo Bagnulo and Andra Lutu and Cristel Pelsser Power Prefixes Prioritization for Smarter BGP Reconvergence . . . . . . . 1074--1087 Vitalii Demianiuk and Sergey Nikolenko and Pavel Chuprikov and Kirill Kogan New Alternatives to Optimize Policy Classifiers . . . . . . . . . . . . . . 1088--1101 Bo Cheng and Shoulu Hou and Ming Wang and Shuai Zhao and Junliang Chen HSOP: a Hybrid Service Orchestration Platform for Internet-Telephony Networks 1102--1115 Xiaofeng Cao and Guoming Tang and Deke Guo and Yan Li and Weiming Zhang Edge Federation: Towards an Integrated Service Provisioning Model . . . . . . . 1116--1129 Milad Mahdian and Armin Moharrer and Stratis Ioannidis and Edmund Yeh Kelly Cache Networks . . . . . . . . . . 1130--1143 Ning Xie and Shengli Zhang and Alex X. Liu Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems 1144--1157 Ramon Fernandes and César Marcon and Rodrigo Cataldo and Johanna Sepúlveda Using Smart Routing for Secure and Dependable NoC-Based MPSoCs . . . . . . 1158--1171 Ran Ben Basat and Xiaoqi Chen and Gil Einziger and Ori Rottenstreich Designing Heavy-Hitter Detection Algorithms for Programmable Switches . . 1172--1185 Shay Vargaftik and Isaac Keslassy and Ariel Orda LSQ: Load Balancing in Large-Scale Heterogeneous Systems With Multiple Dispatchers . . . . . . . . . . . . . . 1186--1198 Ali Yekkehkhany and Rakesh Nagi Blind GB-PANDAS: a Blind Throughput-Optimal Load Balancing Algorithm for Affinity Scheduling . . . 1199--1212 Alia Asheralieva and Dusit Niyato Combining Contract Theory and Lyapunov Optimization for Content Sharing With Edge Caching and Device-to-Device Communications . . . . . . . . . . . . . 1213--1226 Yongmin Zhang and Xiaolong Lan and Ju Ren and Lin Cai Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks . . 1227--1240 Qingyu Liu and Lei Deng and Haibo Zeng and Minghua Chen A Tale of Two Metrics in Network Delay Optimization . . . . . . . . . . . . . . 1241--1254 Fangxin Wang and Cong Zhang and Feng Wang and Jiangchuan Liu and Yifei Zhu and Haitian Pang and Lifeng Sun DeepCast: Towards Personalized QoE for Edge-Assisted Crowdcast With Deep Reinforcement Learning . . . . . . . . . 1255--1268 Kai Ding and Homayoun Yousefi'zadeh and Faryar Jabbari Connectivity Maintenance in Mobile Networks . . . . . . . . . . . . . . . . 1269--1282 Damiano Carra and Giovanni Neglia and Pietro Michiardi Elastic Provisioning of Cloud Caches: a Cost-Aware TTL Approach . . . . . . . . 1283--1296 Youlin Zhang and Shigang Chen and You Zhou and Yuguang Fang Missing-Tag Detection With Unknown Tags 1297--1310 Francesca Fossati and Stefano Moretti and Patrice Perny and Stefano Secci Multi-Resource Allocation for Network Slicing . . . . . . . . . . . . . . . . 1311--1324 Jing Fu and Bill Moran Energy-Efficient Job-Assignment Policy With Asymptotically Guaranteed Performance Deviation . . . . . . . . . 1325--1338 Xiaocan Li and Kun Xie and Xin Wang and Gaogang Xie and Dongliang Xie and Zhenyu Li and Jigang Wen and Zulong Diao and Tian Wang Quick and Accurate False Data Detection in Mobile Crowd Sensing . . . . . . . . 1339--1352 Attila K\Horösi and András Gulyás and Zalan Heszberger and József Bíró and Gábor Rétvári On the Memory Requirement of Hop-by-Hop Routing: Tight Bounds and Optimal Address Spaces . . . . . . . . . . . . . 1353--1363 Yang Li and Jianwei Zheng and Zhenhua Li and Yunhao Liu and Feng Qian and Sen Bai and Yao Liu and Xianlong Xin Understanding the Ecosystem and Addressing the Fundamental Concerns of Commercial MVNO . . . . . . . . . . . . 1364--1377
Mohammad Hassan Lotfi and Saswati Sarkar and George Kesidis Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? . . 1435--1448 Ankur Sarker and Chenxi Qiu and Haiying Shen Connectivity Maintenance for Next-Generation Decentralized Vehicle Platoon Networks . . . . . . . . . . . . 1449--1462 He Huang and Yu-E Sun and Chaoyi Ma and Shigang Chen and You Zhou and Wenjian Yang and Shaojie Tang and Hongli Xu and Yan Qiao An Efficient $K$-Persistent Spread Estimator for Traffic Measurement in High-Speed Networks . . . . . . . . . . 1463--1476 Yilei Lin and Ting He and Shiqiang Wang and Kevin Chan and Stephen Pasteris Looking Glass of NFV: Inferring the Structure and State of NFV Network From External Observations . . . . . . . . . 1477--1490 Zhangyu Guan and Nan Cen and Tommaso Melodia and Scott M. Pudlewski Distributed Joint Power, Association and Flight Control for Massive-MIMO Self-Organizing Flying Drones . . . . . 1491--1505 Sudeep Bhattarai and Jung-Min Park and William Lehr Dynamic Exclusion Zones for Protecting Primary Users in Database-Driven Spectrum Sharing . . . . . . . . . . . . 1506--1519 Reza Banirazi and Edmond Jonckheere and Bhaskar Krishnamachari Heat-Diffusion: Pareto Optimal Dynamic Routing for Time-Varying Wireless Networks . . . . . . . . . . . . . . . . 1520--1533 Anfu Zhou and Shaoqing Xu and Song Wang and Jingqi Huang and Shaoyuan Yang and Teng Wei and Xinyu Zhang and Huadong Ma Robotic Millimeter-Wave Wireless Networks . . . . . . . . . . . . . . . . 1534--1549 Wojciech Kabaci\'nski and Mustafa Abdulsahib Wide-Sense Nonblocking Converting-Space-Converting Switching Node Architecture Under XsVarSWITCH Control Algorithm . . . . . . . . . . . 1550--1561 Zengfu Wang and Qing Wang and Bill Moran and Moshe Zukerman Optimal Submarine Cable Path Planning and Trunk-and-Branch Tree Network Topology Design . . . . . . . . . . . . 1562--1572 Ying Tian and Zhiliang Wang and Xia Yin and Xingang Shi and Yingya Guo and Haijun Geng and Jiahai Yang Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning 1573--1586 Chenglong Shao and Hoorin Park and Heejun Roh and Wonjun Lee and Hyoil Kim PolarScout: Wi-Fi Interference-Resilient ZigBee Communication via Shell-Shaping 1587--1600 Kun Xie and Yuxiang Chen and Xin Wang and Gaogang Xie and Jiannong Cao and Jigang Wen and Guangming Yang and Jiaqi Sun Accurate and Fast Recovery of Network Monitoring Data With GPU-Accelerated Tensor Completion . . . . . . . . . . . 1601--1614 Vignesh Sivaraman and Dibyajyoti Guha and Biplab Sikdar Optimal Pending Interest Table Size for ICN With Mobile Producers . . . . . . . 1615--1628 Zhe Wang and Yifeng Cao and Linghe Kong and Guihai Chen and Jiadi Yu and Shaojie Tang and Yingying Chen Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications 1629--1642 Yixin Li and Bin Cao and Mugen Peng and Long Zhang and Lei Zhang and Daquan Feng and Jihong Yu Direct Acyclic Graph-Based Ledger for Internet of Things: Performance and Security Analysis . . . . . . . . . . . 1643--1656 Konstantinos Konstantinidis and Aditya Ramamoorthy Resolvable Designs for Speeding Up Distributed Computing . . . . . . . . . 1657--1670 Guocheng Liao and Xu Chen and Jianwei Huang Social-Aware Privacy-Preserving Mechanism for Correlated Data . . . . . 1671--1683 Sheng Zhang and Yu Liang and Jidong Ge and Mingjun Xiao and Jie Wu Provably Efficient Resource Allocation for Edge Service Entities Using Hermes 1684--1697 Kevin Spiteri and Rahul Urgaonkar and Ramesh K. Sitaraman BOLA: Near-Optimal Bitrate Adaptation for Online Videos . . . . . . . . . . . 1698--1711 Yue Cao and Ahmed Osama Fathy Atya and Shailendra Singh and Zhiyun Qian and Srikanth V. Krishnamurthy and Thomas F. La Porta and Prashant Krishnamurthy and Lisa Marvel Packet Header Obfuscation Using MIMO . . 1712--1725 Huynh Tu Dang and Pietro Bressana and Han Wang and Ki Suh Lee and Noa Zilberman and Hakim Weatherspoon and Marco Canini and Fernando Pedone and Robert Soulé P4xos: Consensus as a Network Service 1726--1738 Rahul Vaze and Jayakrishnan Nair Multiple Server SRPT With Speed Scaling Is Competitive . . . . . . . . . . . . . 1739--1751 Songtao Wang and Dan Li and Yang Cheng and Jinkun Geng and Yanshu Wang and Shuai Wang and Shutao Xia and Jianping Wu A Scalable, High-Performance, and Fault-Tolerant Network Architecture for Distributed Machine Learning . . . . . . 1752--1764 Rajat Talak and Sertac Karaman and Eytan Modiano Improving Age of Information in Wireless Networks With Perfect Channel State Information . . . . . . . . . . . . . . 1765--1778 Sarhad Arisdakessian and Omar Abdel Wahab and Azzam Mourad and Hadi Otrok and Nadjia Kara FoGMatch: an Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory . . . . . . . . . . . . . . . . . 1779--1789 Yidan Hu and Rui Zhang A Spatiotemporal Approach for Secure Crowdsourced Radio Environment Map Construction . . . . . . . . . . . . . . 1790--1803 Zhenlin An and Qiongzheng Lin and Lei Yang and Wei Lou and Lei Xie Acquiring Bloom Filters Across Commercial RFIDs in Physical Layer . . . 1804--1817 Pedram Kheirkhah Sangdeh and Hossein Pirayesh and Adnan Quadri and Huacheng Zeng A Practical Spectrum Sharing Scheme for Cognitive Radio Networks: Design and Experiments . . . . . . . . . . . . . . 1818--1831 Yuqi Fan and Wenlong Liu and Dan Guo and Weili Wu and Dingzhu Du Shuffle Scheduling for MapReduce Jobs Based on Periodic Network Status . . . . 1832--1844
Alireza Ameli Renani and Jun Huang and Guoliang Xing and Abdol-Hossein Esfahanian and Weiguo Wu Harnessing Hardware Defects for Improving Wireless Link Performance . . 1913--1924 Ruomu Hou and Irvan Jahja and Loi Luu and Prateek Saxena and Haifeng Yu Randomized View Reconciliation in Permissionless Distributed Systems . . . 1925--1938 Dheeraj Narasimha and Srinivas Shakkottai and Lei Ying A Mean Field Game Analysis of Distributed MAC in Ultra-Dense Multichannel Wireless Networks . . . . . 1939--1952 Mohammed Hawari and Juan-Antonio Cordero-Fuertes and Thomas Clausen High-Accuracy Packet Pacing on Commodity Servers for Constant-Rate Flows . . . . 1953--1967 Nai-Wen Chang and Sun-Yuan Hsieh Conditional Diagnosability of Alternating Group Networks Under the PMC Model . . . . . . . . . . . . . . . . . 1968--1980 Fardin Derogarian Miyandoab and João Canas Ferreira and Vítor M. Grade Tavares and José Machado da Silva and Fernando J. Velez A Multifunctional Integrated Circuit Router for Body Area Network Wearable Systems . . . . . . . . . . . . . . . . 1981--1994 Ye Li and Hong Xie and John C. S. Lui and Kenneth L. Calvert Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models . . . 1995--2008 Hao Li and Zhengda Bian and Peng Zhang and Zhun Sun and Chengchen Hu and Qiang Fu and Tian Pan and Jia Lv Application-Oblivious L7 Parsing Using Recurrent Neural Networks . . . . . . . 2009--2022 Jia Liu and Shigang Chen and Min Chen and Qingjun Xiao and Lijun Chen Pose Sensing With a Single RFID Tag . . 2023--2036 Haojun Huang and Wang Miao and Geyong Min and Chengqiang Huang and Xu Zhang and Chen Wang Resilient Range-Based $d$-Dimensional Localization for Mobile Sensor Networks 2037--2050 Zina Chkirbene and Rachid Hadjidj and Sebti Foufou and Ridha Hamila LaScaDa: a Novel Scalable Topology for Data Center Network . . . . . . . . . . 2051--2064 Sara El Alaoui and Byrav Ramamurthy MARS: a Multi-Attribute Routing and Scheduling Algorithm for DTN Interplanetary Networks . . . . . . . . 2065--2076 Nurullah Karakoç and Anna Scaglione and Angelia Nedi\'c and Martin Reisslein Multi-Layer Decomposition of Network Utility Maximization Problems . . . . . 2077--2091 Yutong Zhai and Hongli Xu and Haibo Wang and Zeyu Meng and He Huang Joint Routing and Sketch Configuration in Software-Defined Networking . . . . . 2092--2105 Conor Sexton and Nicola Marchetti and Luiz A. DaSilva On Provisioning Slices and Overbooking Resources in Service Tailored Networks of the Future . . . . . . . . . . . . . 2106--2119 Si Chen and Wei Gong and Jia Zhao and Jiangchuan Liu High-Throughput and Robust Rate Adaptation for Backscatter Networks . . 2120--2131 Qingyu Liu and Haibo Zeng and Minghua Chen Network Utility Maximization Under Maximum Delay Constraints and Throughput Requirements . . . . . . . . . . . . . . 2132--2145 Hooshang Ghasemi and Aditya Ramamoorthy Asynchronous Coded Caching With Uncoded Prefetching . . . . . . . . . . . . . . 2146--2159 Jian Su and Alex X. Liu and Zhengguo Sheng and Yongrui Chen A Partitioning Approach to RFID Identification . . . . . . . . . . . . . 2160--2173 Youlin Zhang and Shigang Chen and You Zhou and Olufemi O. Odegbile and Yuguang Fang Efficient Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets With Unreliable Channels . . . . . . . . . . . . . . . . 2174--2187 Dingwen Yuan and Hsuan-Yin Lin and Jörg Widmer and Matthias Hollick Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks . . . 2188--2202 Francesco Devoti and Ilario Filippini Planning mm-Wave Access Networks Under Obstacle Blockages: a Reliability-Aware Approach . . . . . . . . . . . . . . . . 2203--2214 Ali Maatouk and Saad Kriouile and Mohamad Assaad and Anthony Ephremides The Age of Incorrect Information: a New Performance Metric for Status Updates 2215--2228 David A. Hayes and Michael Welzl and Simone Ferlin and David Ros and Safiqul Islam Online Identification of Groups of Flows Sharing a Network Bottleneck . . . . . . 2229--2242 Huanle Xu and Yang Liu and Wing Cheong Lau and Tiantong Zeng and Jun Guo and Alex X. Liu Online Resource Allocation With Machine Variability: a Bandit Perspective . . . 2243--2256 Ziling Wei and Jinshu Su and Baokang Zhao and Xicheng Lu Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting . . . . . . . . . . . . . . . 2257--2270 Jaeyoung Choi and Sangwoo Moon and Jiin Woo and Kyunghwan Son and Jinwoo Shin and Yung Yi Information Source Finding in Networks: Querying With Budgets . . . . . . . . . 2271--2284 Peter Key and Richard Steinberg Pricing, Competition and Content for Internet Service Providers . . . . . . . 2285--2298 Cheng Chen and Randall A. Berry and Michael L. Honig and Vijay G. Subramanian Pricing, Bandwidth Allocation, and Service Competition in Heterogeneous Wireless Networks . . . . . . . . . . . 2299--2308 Ning Xie and Le Ou-Yang and Alex X. Liu A Machine Learning Approach to Blind Multi-Path Classification for Massive MIMO Systems . . . . . . . . . . . . . . 2309--2322
Quang-Trung Luu and Sylvaine Kerboeuf and Alexandre Mouradian and Michel Kieffer A Coverage-Aware Resource Provisioning Method for Network Slicing . . . . . . . 2393--2406 Stefano Coniglio and Luca Giovanni Gianoli and Edoardo Amaldi and Antonio Capone Elastic Traffic Engineering Subject to a Fair Bandwidth Allocation via Bilevel Programming . . . . . . . . . . . . . . 2407--2420 János Tapolcai and Lajos Rónyai and Balázs Vass and László Gyimóthi Fast Enumeration of Regional Link Failures Caused by Disasters With Limited Size . . . . . . . . . . . . . . 2421--2434 Ali Munir and Ting He and Ramya Raghavendra and Franck Le and Alex X. Liu Network Scheduling and Compute Resource Aware Task Placement in Datacenters . . 2435--2448 Xiuzhen Guo and Yuan He and Xiaolong Zheng WiZig: Cross-Technology Energy Communication Over a Noisy Channel . . . 2449--2460 Guocong Quan and Jian Tan and Atilla Eryilmaz Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels . . . . . . . . . . 2461--2474 Jingxuan Zhang and Kai Gao and Y. Richard Yang and Jun Bi Prophet: Toward Fast, Error-Tolerant Model-Based Throughput Prediction for Reactive Flows in DC Networks . . . . . 2475--2488 Yuxuan Jiang and Mohammad Shahrad and David Wentzlaff and Danny H. K. Tsang and Carlee Joe-Wong Burstable Instances for Clouds: Performance Modeling, Equilibrium Analysis, and Revenue Maximization . . . 2489--2502 Hao Zhou and Xiaofeng Gao and Jiaqi Zheng and Guihai Chen Scheduling Relaxed Loop-Free Updates Within Tight Lower Bounds in SDNs . . . 2503--2516 Thomas Stahlbuhk and Brooke Shrader and Eytan Modiano Throughput Maximization in Uncooperative Spectrum Sharing Networks . . . . . . . 2517--2530 Zhanzhan Zhang and Yin Sun and Ashutosh Sabharwal and Zhiyong Chen and Bin Xia Scheduling and Power Allocation Dampens the Negative Effect of Channel Misreporting in Massive MIMO . . . . . . 2531--2544 Zhiwei Zhao and Geyong Min and Wei Dong and Xue Liu and Weifeng Gao and Tao Gu and Minghang Yang Exploiting Link Diversity for Performance-Aware and Repeatable Simulation in Low-Power Wireless Networks . . . . . . . . . . . . . . . . 2545--2558 Ali Mohammadkhan and K. K. Ramakrishnan and Vivek A. Jain CleanG --- Improving the Architecture and Protocols for Future Cellular Networks With NFV . . . . . . . . . . . 2559--2572 Xianjin Xia and Yuanqing Zheng and Tao Gu FTrack: Parallel Decoding for LoRa Transmissions . . . . . . . . . . . . . 2573--2586 Muhammad Shahbaz and Lalith Suresh and Jennifer Rexford and Nick Feamster and Ori Rottenstreich and Mukesh Hira Elmo: Source Routed Multicast for Public Clouds . . . . . . . . . . . . . . . . . 2587--2600 Mark Shifrin and Daniel S. Menasché and Asaf Cohen and Dennis Goeckel and Omer Gurewitz Optimal PHY Configuration in Wireless Networks . . . . . . . . . . . . . . . . 2601--2614 Jinyong Chang and Yanyan Ji and Bilin Shao and Maozhi Xu and Rui Xue Certificateless Homomorphic Signature Scheme for Network Coding . . . . . . . 2615--2628 Jinlong E. and Yong Cui and Zhenhua Li and Mingkang Ruan and Ennan Zhai HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting . . . . . . . . . . . . . . . . 2629--2642 Lingnan Gao and George N. Rouskas Congestion Minimization for Service Chain Routing Problems With Path Length Considerations . . . . . . . . . . . . . 2643--2656 Sicheng Zhao and Xing Wu and Zuqing Zhu On Parallel and Hitless vSDN Reconfiguration . . . . . . . . . . . . 2657--2670 Fehmina Malik and Manjesh K. Hanawal and Yezekael Hayel Zero-Rating of Content and Its Effect on the Quality of Service in the Internet 2671--2684 Kemi Ding and Junshan Zhang Multi-Party Privacy Conflict Management in Online Social Networks: a Network Game Perspective . . . . . . . . . . . . 2685--2698 Tong Ye and Jingjie Ding and Tony T. Lee and Guido Maier AWG-Based Nonblocking Shuffle--Exchange Networks . . . . . . . . . . . . . . . . 2699--2712 Huazhe Wang and Xin Li and Yang Wang and Yu Zhao and Ye Yu and Hongkun Yang and Chen Qian SICS: Secure and Dynamic Middlebox Outsourcing . . . . . . . . . . . . . . 2713--2726 Juhyeng Han and Seongmin Kim and Daeyang Cho and Byungkwon Choi and Jaehyeong Ha and Dongsu Han A Secure Middlebox Framework for Enabling Visibility Over Multiple Encryption Protocols . . . . . . . . . . 2727--2740 Hui Xia and Rui Zhang and Xiangguo Cheng and Tie Qiu and Dapeng Oliver Wu Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas . . . . . . . . . . . . . . . . 2741--2754 Boyuan Yan and Yongli Zhao and Xiaosong Yu and Yajie Li and Sabidur Rahman and Yongqi He and Xiangjun Xin and Jie Zhang Service Function Path Provisioning With Topology Aggregation in Multi-Domain Optical Networks . . . . . . . . . . . . 2755--2767 Yiming Zhang and Haonan Wang and Menghan Jia and Jinyan Wang and Dongsheng Li and Guangtao Xue and Kian-Lee Tan TopoX: Topology Refactorization for Minimizing Network Communication in Graph Computations . . . . . . . . . . . 2768--2782 Xi Huang and Simeng Bian and Ziyu Shao and Hong Xu Predictive Switch-Controller Association and Control Devolution for SDN Systems 2783--2796 Lei Deng and Haifeng Zheng and Xiao-Yang Liu and Xinxin Feng and Zhizhang David Chen Network Latency Estimation With Leverage Sampling for Personal Devices: an Adaptive Tensor Completion Approach . . 2797--2808
Vasileios Giotsas and George Nomikos and Vasileios Kotronis and Pavlos Sermpezis and Petros Gigis and Lefteris Manassakis and Christoph Dietzel and Stavros Konstantaras and Xenofontas Dimitropoulos O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs 1--16 Zehua Guo and Yang Xu and Ya-Feng Liu and Sen Liu and H. Jonathan Chao and Zhi-Li Zhang and Yuanqing Xia AggreFlow: Achieving Power Efficiency, Load Balancing, and Quality of Service in Data Center Networks . . . . . . . . 17--33 Lin Wang and Lei Jiao and Ting He and Jun Li and Henri Bal Service Placement for Collaborative Edge Applications . . . . . . . . . . . . . . 34--47 Haipeng Dai and Yunhuai Liu and Nan Yu and Chaofeng Wu and Guihai Chen and Tian He and Alex X. Liu Radiation Constrained Wireless Charger Placement . . . . . . . . . . . . . . . 48--64 Meng Jin and Yuan He and Xin Meng and Dingyi Fang and Xiaojiang Chen Parallel Backscatter in the Wild: When Burstiness and Randomness Play With You 65--77 Xiaoli Zhang and Qi Li and Zeyu Zhang and Jianping Wu and Jiahai Yang vSFC: Generic and Agile Verification of Service Function Chains in the Cloud . . 78--91 Minmei Wang and Chen Qian and Xin Li and Shouqian Shi and Shigang Chen Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching . . . . . . . . . . . . . . . . 92--105 Zahra Naghsh and Shahrokh Valaee Conflict-Free Scheduling in Cellular V2X Communications . . . . . . . . . . . . . 106--119 Weng Chon Ao and Po-Han Huang and Konstantinos Psounis Joint Workload Distribution and Capacity Augmentation in Hybrid Datacenter Networks . . . . . . . . . . . . . . . . 120--133 Shaojun Zou and Jiawei Huang and Jianxin Wang and Tian He Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks . . . 134--147 Yunpeng Li and Costas A. Courcoubetis and Lingjie Duan and Richard Weber Optimal Pricing for Peer-to-Peer Sharing With Network Externalities . . . . . . . 148--161 Chuanwen Luo and Meghana N. Satpute and Deying Li and Yongcai Wang and Wenping Chen and Weili Wu Fine-Grained Trajectory Optimization of Multiple UAVs for Efficient Data Gathering from WSNs . . . . . . . . . . 162--175 Wenzheng Xu and Weifa Liang and Zichuan Xu and Jian Peng and Dezhong Peng and Tang Liu and Xiaohua Jia and Sajal K. Das Approximation Algorithms for the Generalized Team Orienteering Problem and its Applications . . . . . . . . . . 176--189 Zuyuan Zhang and Fangming Shao and Nan Zhang and Yifeng Niu Maximizing $k$-Terminal Network Reliability in Some Sparse Graphs . . . 190--202 Huanhuan Huang and Tong Ye and Tony T. Lee and Weiqiang Sun Delay and Stability Analysis of Connection-Based Slotted-Aloha . . . . . 203--219 Konstantinos Psychasand and Javad Ghaderi High-Throughput Bin Packing: Scheduling Jobs With Random Resource Demands in Clusters . . . . . . . . . . . . . . . . 220--233 B. R. Vinay Kumar and Navin Kashyap Probabilistic Forwarding of Coded Packets on Networks . . . . . . . . . . 234--247 Jianchun Liu and Hongli Xu and Gongming Zhao and Chen Qian and Xingpeng Fan and Xuwei Yang and He Huang Incremental Server Deployment for Software-Defined NFV-Enabled Networks 248--261 Timmy Schüller and Nils Aschenbruck and Markus Chimani and Martin Horneffer Failure Resiliency With Only a Few Tunnels --- Enabling Segment Routing for Traffic Engineering . . . . . . . . . . 262--274 Vitalii Demianiuk and Sergey Gorinsky and Sergey I. Nikolenko and Kirill Kogan Robust Distributed Monitoring of Traffic Flows . . . . . . . . . . . . . . . . . 275--288 Chunyu Qiao and Jiliang Wang and Yunhao Liu Beyond QoE: Diversity Adaptation in Video Streaming at the Edge . . . . . . 289--302 Luca Maria Castiglione and Paolo Falcone and Alberto Petrillo and Simon Pietro Romano and Stefania Santini Cooperative Intersection Crossing Over 5G . . . . . . . . . . . . . . . . . . . 303--317 Ahsen Ejaz and Vassilis Papaefstathiou and Ioannis Sourdis HighwayNoC: Approaching Ideal NoC Performance With Dual Data Rate Routers 318--331 Peng Zhang and Fangzheng Zhang and Shimin Xu and Zuoru Yang and Hao Li and Qi Li and Huanzhao Wang and Chao Shen and Chengchen Hu Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks . . . . . . . . . . . . 332--345 Saadallah Kassir and Pablo Caballero Garces and Gustavo de Veciana and Nannan Wang and Xi Wang and Paparao Palacharla An Analytical Model and Performance Evaluation of Multihomed Multilane VANETs . . . . . . . . . . . . . . . . . 346--359 Zhiyuan Xu and Dejun Yang and Jian Tang and Yinan Tang and Tongtong Yuan and Yanzhi Wang and Guoliang Xue An Actor--Critic-Based Transfer Learning Framework for Experience-Driven Networking . . . . . . . . . . . . . . . 360--371 Xinyu Tong and Yang Wan and Qianru Li and Xiaohua Tian and Xinbing Wang CSI Fingerprinting Localization With Low Human Efforts . . . . . . . . . . . . . 372--385 Jianxiong Guo and Tiantian Chen and Weili Wu A Multi-Feature Diffusion Model: Rumor Blocking in Social Networks . . . . . . 386--397 Canh T. Dinh and Nguyen H. Tran and Minh N. H. Nguyen and Choong Seon Hong and Wei Bao and Albert Y. Zomaya and Vincent Gramoli Federated Learning Over Wireless Networks: Convergence Analysis and Resource Allocation . . . . . . . . . . 398--409 Zhichao Cao and Jiliang Wang and Daibo Liu and Qiang Ma and Xin Miao and Xufei Mao Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle Networks . . 410--422
Wei Bai and Shuihai Hu and Kai Chen and Kun Tan and Yongqiang Xiong One More Config is Enough: Saving (DC)TCP for High-Speed Extremely Shallow-Buffered Datacenters . . . . . . 489--502 Sándor Laki and Szilveszter Nádas and Gerg\Ho Gombos and Ferenc Fejes and Péter Hudoba and Zoltán Turányi and Zoltán Kiss and Csaba Keszei Core-Stateless Forwarding With QoS Revisited: Decoupling Delay and Bandwidth Requirements . . . . . . . . . 503--516 Gal Mendelson and Shay Vargaftik and Katherine Barabash and Dean H. Lorenz and Isaac Keslassy and Ariel Orda AnchorHash: a Scalable Consistent Hash 517--528 Bahman Abolhassani and John Tadrous and Atilla Eryilmaz Delay Gain Analysis of Wireless Multicasting for Content Distribution 529--542 Fan Cheng and Congtao Wang and Xingyi Zhang and Yun Yang A Local-Neighborhood Information Based Overlapping Community Detection Algorithm for Large-Scale Complex Networks . . . . . . . . . . . . . . . . 543--556 Wenjie Li and Sharief M. A. Oteafy and Marwan Fayed and Hossam S. Hassanein Quality of Experience in ICN: Keep Your Low- Bitrate Close and High-Bitrate Closer . . . . . . . . . . . . . . . . . 557--570 Qiao Xiang and Haitao Yu and James Aspnes and Franck Le and Chin Guok and Linghe Kong and Y. Richard Yang Optimizing in the Dark: Learning Optimal Network Resource Reservation Through a Simple Request Interface . . . . . . . . 571--584 Xin Wang and Yinlong Xu and Richard T. B. Ma Paid Peering, Settlement-Free Peering, or Both? . . . . . . . . . . . . . . . . 585--594 Liekang Zeng and Xu Chen and Zhi Zhou and Lei Yang and Junshan Zhang CoEdge: Cooperative DNN Inference With Adaptive Workload Partitioning Over Heterogeneous Edge Devices . . . . . . . 595--608 Itamar Cohen and Gil Einziger and Roy Friedman and Gabriel Scalosub Access Strategies for Network Caching 609--622 Menghao Zhang and Guanyu Li and Lei Xu and Jiasong Bai and Mingwei Xu and Guofei Gu and Jianping Wu Control Plane Reflection Attacks and Defenses in Software-Defined Networks 623--636 Marco Chiesa and Roshan Sedar and Gianni Antichi and Michael Borokhovich and Andrzej Kamisi\'nski and Georgios Nikolaidis and Stefan Schmid Fast ReRoute on Programmable Switches 637--650 Giuliano Casale and Nicolas Gast Performance Analysis Methods for List-Based Caches With Non-Uniform Access . . . . . . . . . . . . . . . . . 651--664 Jing Hou and Li Sun and Tao Shu and Yong Xiao and Marwan Krunz Economics of Strategic Network Infrastructure Sharing: a Backup Reservation Approach . . . . . . . . . . 665--680 Libin Liu and Hong Xu Elasecutor: Elastic Executor Scheduling in Data Analytics Systems . . . . . . . 681--694 Lin He and Gang Ren and Ying Liu and Jiahai Yang PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet . . . . . . . . 695--708 Qian Ma and Edmund Yeh and Jianwei Huang Selfish Caching Games on Directed Graphs 709--722 Zili Meng and Yaning Guo and Yixin Shen and Jing Chen and Chao Zhou and Minhu Wang and Jia Zhang and Mingwei Xu and Chen Sun and Hongxin Hu Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning . . . . . . . . 723--736 Gauri Joshi and Dhruva Kaushal Synergy via Redundancy: Adaptive Replication Strategies and Fundamental Limits . . . . . . . . . . . . . . . . . 737--749 Jeongmin Bae and Joohyun Lee and Song Chong Learning to Schedule Network Resources Throughput and Delay Optimally Using Q$^+$-Learning . . . . . . . . . . . . . 750--763 Shaoran Li and Yan Huang and Chengzhang Li and Brian A. Jalaian and Y. Thomas Hou and Wenjing Lou and Stephen Russell Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty . . 764--778 Vajiheh Farhadi and Fidan Mehmeti and Ting He and Thomas F. La Porta and Hana Khamfroush and Shiqiang Wang and Kevin S. Chan and Konstantinos Poularakis Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds . . . . . . . . . . . . . . . . . 779--792 Yong Huang and Wei Wang and Tao Jiang and Qian Zhang Detecting Colluding Sybil Attackers in Robotic Networks Using Backscatters . . 793--804 Galia Shabtai and Danny Raz and Yuval Shavitt Risk Aware Stochastic Placement of Cloud Services . . . . . . . . . . . . . . . . 805--820 Zicheng Chi and Yan Li and Hongyu Sun and Zhichuan Huang and Ting Zhu Simultaneous Bi-Directional Communications and Data Forwarding Using a Single ZigBee Data Stream . . . . . . 821--833 Fujie Fan and Hangyu Meng and Bing Hu and Kwan L. Yeung and Zhifeng Zhao Roulette Wheel Balancing Algorithm With Dynamic Flowlet Switching for Multipath Datacenter Networks . . . . . . . . . . 834--847 Mohammad Jahanian and K. K. Ramakrishnan Name Space Analysis: Verification of Named Data Network Data Planes . . . . . 848--861 Che-Hao Yu and Lin Huang and Cheng-Shang Chang and Duan-Shin Lee Poisson Receivers: a Probabilistic Framework for Analyzing Coded Random Access . . . . . . . . . . . . . . . . . 862--875 Ming Shi and Xiaojun Lin and Sonia Fahmy Competitive Online Convex Optimization With Switching Costs and Ramp Constraints . . . . . . . . . . . . . . 876--889 Xiaofeng Shi and Haofan Cai and Minmei Wang and Ge Wang and Baiwen Huang and Junjie Xie and Chen Qian TagAttention: Mobile Object Tracing With Zero Appearance Knowledge by Vision-RFID Fusion . . . . . . . . . . . . . . . . . 890--903
Rukhsana Ruby and Shuxin Zhong and Basem M. ElHalawany and Hanjiang Luo and Kaishun Wu SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks . . . . . . . . . . . . . . . . 965--978 Behrooz Farkiani and Bahador Bakhshi and S. Ali MirHassani and Tim Wauters and Bruno Volckaert and Filip De Turck Prioritized Deployment of Dynamic Service Function Chains . . . . . . . . 979--993 Dongxiao Yu and Yifei Zou and Yong Zhang and Hao Sheng and Weifeng Lv and Xiuzhen Cheng An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks . . . . . . . . . . . . . . . . 994--1007 Jiadong Lou and Xu Yuan and Sastry Kompella and Nian-Feng Tzeng Boosting or Hindering: AoI and Throughput Interrelation in Routing-Aware Multi-Hop Wireless Networks . . . . . . . . . . . . . . . . 1008--1021 Chien-Sheng Yang and Ramtin Pedarsani and A. Salman Avestimehr Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing . . . . . . . . . . . . 1022--1031 Kamran Ali and Alex X. Liu and Ioannis Pefkianakis and Kyu-Han Kim Distributed Spectrum Sharing for Enterprise Powerline Communication Networks . . . . . . . . . . . . . . . . 1032--1045 Mengyuan Zhang and Lei Yang and Shibo He and Ming Li and Junshan Zhang Privacy-Preserving Data Aggregation for Mobile Crowdsensing With Externality: an Auction Approach . . . . . . . . . . . . 1046--1059 Gourav Saha and Alhussein A. Abouzeid and Zaheer Khan and Marja Matinmikko-Blue On the Optimal Duration of Spectrum Leases in Exclusive License Markets With Stochastic Demand . . . . . . . . . . . 1060--1073 Ahmed M. Abdelmoniem and Brahim Bensaou T-RACKs: a Faster Recovery Mechanism for TCP in Data Center Networks . . . . . . 1074--1087 Tianming Zhao and Weisheng Si and Wei Li and Albert Y. Zomaya Optimizing the Maximum Vertex Coverage Attacks Under Knapsack Constraint . . . 1088--1104 Guilherme Iecker Ricardo and Alina Tuholukova and Giovanni Neglia and Thrasyvoulos Spyropoulos Caching Policies for Delay Minimization in Small Cell Networks With Coordinated Multi-Point Joint Transmissions . . . . 1105--1115 \'Ciril Ro\vzi\'c and Galen Sasaki Optical Protection Cost of Loop Free Alternates on Completely Connected IP Networks Over Optical Rings . . . . . . 1116--1127 Meng Jin and Yuan He and Chengkun Jiang and Yunhao Liu Parallel Backscatter: Channel Estimation and Beyond . . . . . . . . . . . . . . . 1128--1140 Vitalii Demianiuk and Kirill Kogan and Sergey Nikolenko Approximate Packet Classifiers With Controlled Accuracy . . . . . . . . . . 1141--1154 Holger Boche and Rafael F. Schaefer and H. Vincent Poor On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems . . . 1155--1168 Dan Xia and Xiaolong Zheng and Liang Liu and Chaoyu Wang and Huadong Ma \em $c$--Chirp: Towards Symmetric Cross-Technology Communication Over Asymmetric Channels . . . . . . . . . . 1169--1182 Jiawei Huang and Wenjun Lyu and Weihe Li and Jianxin Wang and Tian He Mitigating Packet Reordering for Random Packet Spraying in Data Center Networks 1183--1196 Yang Yang and Yanjiao Chen and Fei Chen A Compressive Integrity Auditing Protocol for Secure Cloud Storage . . . 1197--1209 K. P. Naveen and Rajesh Sundaresan Double-Auction Mechanisms for Resource Trading Markets . . . . . . . . . . . . 1210--1223 Rahul Singh and P. R. Kumar Adaptive CSMA for Decentralized Scheduling of Multi-Hop Networks With End-to-End Deadline Constraints . . . . 1224--1237 Gamal Sallam and Bo Ji Joint Placement and Allocation of VNF Nodes With Budget and Capacity Constraints . . . . . . . . . . . . . . 1238--1251 Zhenlin An and Lei Yang and Qiongzheng Lin Identifying UHF RFIDs in Range of Readers With WiFi . . . . . . . . . . . 1252--1265 Mohammed Alasmar and Richard Clegg and Nickolay Zakhleniuk and George Parisis Internet Traffic Volumes are Not Gaussian --- They are Log-Normal: an 18-Year Longitudinal Study With Implications for Modelling and Prediction . . . . . . . . . . . . . . . 1266--1279 Haisheng Tan and Chi Zhang and Chao Xu and Yupeng Li and Zhenhua Han and Xiang-Yang Li Regularization-Based Coflow Scheduling in Optical Circuit Switches . . . . . . 1280--1293 Cho-Chun Chiu and Ting He Stealthy DGoS Attack: DeGrading of Service Under the Watch of Network Tomography . . . . . . . . . . . . . . . 1294--1307 Deke Guo and Junjie Xie and Xiaofeng Shi and Haofan Cai and Chen Qian and Honghui Chen HDS: a Fast Hybrid Data Location Service for Hierarchical Mobile Edge Computing 1308--1320 Feihong Yang and Yuan Shen Critical Intensity for Unbounded Sequential Localizability . . . . . . . 1321--1334 Liangxiao Xin and David Starobinski Countering Cascading Denial of Service Attacks on Wi-Fi Networks . . . . . . . 1335--1348 Trupil Limbasiya and Debasis Das and Sajal K. Das MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles . . . . . . . . . . 1349--1361 Subhramoy Mohanti and Elif Bozkaya and M. Yousof Naderi and Berk Canberk and Gokhan Secinti and Kaushik R. Chowdhury WiFED Mobile: WiFi Friendly Energy Delivery With Mobile Distributed Beamforming . . . . . . . . . . . . . . 1362--1375
Jinwei Liu and Haiying Shen and Hongmei Chi and Husnu S. Narman and Yongyi Yang and Long Cheng and Wingyan Chung A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage . . . . . 1436--1451 Yan Gu and Bo Liu and Xiaojun Shen Asymptotically Optimal Online Scheduling With Arbitrary Hard Deadlines in Multi-Hop Communication Networks . . . . 1452--1466 Amir Behrouzi-Far and Emina Soljanin Efficient Replication for Fast and Predictable Performance in Distributed Computing . . . . . . . . . . . . . . . 1467--1476 Jiancheng Ye and Ka-Cheong Leung and Steven H. Low Combating Bufferbloat in Multi-Bottleneck Networks: Theory and Algorithms . . . . . . . . . . . . . . . 1477--1493 Sneihil Gopal and Sanjit K. Kaul and Rakesh Chaturvedi and Sumit Roy Coexistence of Age and Throughput Optimizing Networks: a Spectrum Sharing Game . . . . . . . . . . . . . . . . . . 1494--1508 Guanyu Li and Menghao Zhang and Shicheng Wang and Chang Liu and Mingwei Xu and Ang Chen and Hongxin Hu and Guofei Gu and Qi Li and Jianping Wu Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches . . . . . . . . . 1509--1526 Guanhao Wu and Xiaofeng Gao and Jiaqi Zheng and Guihai Chen Achieving Fast Loop-Free Updates With Ingress Port in Software-Defined Networks . . . . . . . . . . . . . . . . 1527--1539 Miguel Neves and Bradley Huffaker and Kirill Levchenko and Marinho Barcellos Dynamic Property Enforcement in Programmable Data Planes . . . . . . . . 1540--1552 Huanle Xu and Yang Liu and Wing Cheong Lau Optimal Job Scheduling With Resource Packing for Heterogeneous Servers . . . 1553--1566 Yuan He and Xiuzhen Guo and Jia Zhang and Haotian Jiang WIDE: Physical-Level CTC via Digital Emulation . . . . . . . . . . . . . . . 1567--1579 Ziyao Zhang and Liang Ma and Kin K. Leung and Franck Le More Is Not Always Better: an Analytical Study of Controller Synchronizations in Distributed SDN . . . . . . . . . . . . 1580--1590 Tingjun Chen and Mahmood Baraani Dastjerdi and Harish Krishnaswamy and Gil Zussman Wideband Full-Duplex Phased Array With Joint Transmit and Receive Beamforming: Optimization and Rate Gains . . . . . . 1591--1604 Zhe Chen and Xu Zhang and Sulei Wang and Yuedong Xu and Jie Xiong and Xin Wang Enabling Practical Large-Scale MIMO in WLANs With Hybrid Beamforming . . . . . 1605--1619 Cheng-Shang Chang and Jang-Ping Sheu and Yi-Jheng Lin On the Theoretical Gap of Channel Hopping Sequences With Maximum Rendezvous Diversity in the Multichannel Rendezvous Problem . . . . . . . . . . . 1620--1633 Bijoy Chand Chatterjee and Abdul Wadud and Imran Ahmed and Eiji Oki Priority-Based Inter-Core and Inter-Mode Crosstalk-Avoided Resource Allocation for Spectrally-Spatially Elastic Optical Networks . . . . . . . . . . . . . . . . 1634--1647 Balázs Vass and János Tapolcai and Erika R. Bérczi-Kovács Enumerating Maximal Shared Risk Link Groups of Circular Disk Failures Hitting $k$ Nodes . . . . . . . . . . . . . . . 1648--1661 Yifei Zou and Dongxiao Yu and Jiguo Yu and Yong Zhang and Falko Dressler and Xiuzhen Cheng Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks . . . . . . . . . . . 1662--1675 Yuhui Zhang and Dejun Yang RobustPay$^+$: Robust Payment Routing With Approximation Guarantee in Blockchain-Based Payment Channel Networks . . . . . . . . . . . . . . . . 1676--1686 Ning Li and Zhaoxin Zhang and Alex X. Liu and Xin Yuan and Yexia Cheng Pairwise-Based Multi-Attribute Decision Making Approach for Wireless Network . . 1687--1702 Christos Tsanikidis and Javad Ghaderi On the Power of Randomization for Scheduling Real-Time Traffic in Wireless Networks . . . . . . . . . . . . . . . . 1703--1716 Si Chen and Maolin Zhang and Jia Zhao and Wei Gong and Jiangchuan Liu Reliable and Practical Bluetooth Backscatter With Commodity Devices . . . 1717--1729 Gayane Vardoyan and C. V. Hollot and Don Towsley Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and Its Applications . . . . . . . . . . . . 1730--1744 Qian Ma and Jianwei Huang and Tamer Ba\csar and Ji Liu and Xudong Chen Reputation and Pricing Dynamics in Online Markets . . . . . . . . . . . . . 1745--1759 Jianan Zhang and Abhishek Sinha and Jaime Llorca and Antonia M. Tulino and Eytan Modiano Optimal Control of Distributed Computing Networks With Mixed-Cast Traffic Flows 1760--1773 Himaja Kesavareddigari and Atilla Eryilmaz Counter-Intuitive Characteristics of Rational Decision-Making Using Biased Inputs in Information Networks . . . . . 1774--1785 Raimund Kirner and Peter Puschner A Quantitative Analysis of Interfaces to Time-Triggered Communication Buses . . . 1786--1797 Qiang Li and Zhihao Wang and Dawei Tan and Jinke Song and Haining Wang and Limin Sun and Jiqiang Liu GeoCAM: an IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks . . . . . . . . . . . . . . . 1798--1812 Ming Tang and Jianwei Huang How Do You Earn Money on Live Streaming Platforms? --- A Study of Donation-Based Markets . . . . . . . . . . . . . . . . 1813--1826 Ning Xie and Haijun Tan and Lei Huang and Alex X. Liu Physical-Layer Authentication in Wirelessly Powered Communication Networks . . . . . . . . . . . . . . . . 1827--1840 Haisheng Tan and Shaofeng H.-C. Jiang and Zhenhua Han and Mingxia Li Asymptotically Optimal Online Caching on Multiple Caches With Relaying and Bypassing . . . . . . . . . . . . . . . 1841--1852
Huy Duong and Brigitte Jaumard and David Coudert and Romualdas Armolavicius Efficient Make-Before-Break Layer 2 Reoptimization . . . . . . . . . . . . . 1910--1921 Dianqi Han and Ang Li and Lili Zhang and Yan Zhang and Jiawei Li and Tao Li and Ting Zhu and Yanchao Zhang Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense . . . . . . . . . . . 1922--1932 Isfar Tariq and Rajat Sen and Thomas Novlan and Salam Akoum and Milap Majmundar and Gustavo de Veciana and Sanjay Shakkottai Auto-Tuning for Cellular Scheduling Through Bandit-Learning and Low-Dimensional Clustering . . . . . . . 1933--1947 Gourav Saha and Alhussein A. Abouzeid Optimal Spectrum Partitioning and Licensing in Tiered Access Under Stochastic Market Models . . . . . . . . 1948--1961 Tasmeen Zaman Ornee and Yin Sun Sampling and Remote Estimation for the Ornstein--Uhlenbeck Process Through Queues: Age of Information and Beyond 1962--1975 Tian Pan and Xingchen Lin and Enge Song and Cheng Xu and Jiao Zhang and Hao Li and Jianhui Lv and Tao Huang and Bin Liu and Beichuan Zhang NB-Cache: Non-Blocking In-Network Caching for High-Performance Content Routers . . . . . . . . . . . . . . . . 1976--1989 Wei Sun and Lisong Xu and Sebastian Elbaum and Di Zhao Model-Agnostic and Efficient Exploration of Numerical Congestion Control State Space of Real-World TCP Implementations 1990--2004 Dai Zhang and Yu Zhou and Zhaowei Xi and Yangyang Wang and Mingwei Xu and Jianping Wu HyperTester: High-Performance Network Testing Driven by Programmable Switches 2005--2018 Su Wang and Yichen Ruan and Yuwei Tu and Satyavrat Wagle and Christopher G. Brinton and Carlee Joe-Wong Network-Aware Optimization of Distributed Learning for Fog Computing 2019--2032 I-Chieh Lin and Yu-Hsuan Yeh and Kate Ching-Ju Lin Toward Optimal Partial Parallelization for Service Function Chaining . . . . . 2033--2044 Zai Shi and Atilla Eryilmaz A Flexible Distributed Stochastic Optimization Framework for Concurrent Tasks in Processing Networks . . . . . . 2045--2058 Xuwei Yang and Hongli Xu and Shigang Chen and He Huang Indirect Multi-Mapping for Burstiness Management in Software Defined Networks 2059--2072 He Huang and Yu-E Sun and Chaoyi Ma and Shigang Chen and Yang Du and Haibo Wang and Qingjun Xiao Spread Estimation With Non-Duplicate Sampling in High-Speed Networks . . . . 2073--2086 Kashyap Thimmaraju and Liron Schiff and Stefan Schmid Preacher: Network Policy Checker for Adversarial Environments . . . . . . . . 2087--2100 Sergio Barrachina-Muñoz and Boris Bellalta and Edward W. Knightly Wi-Fi Channel Bonding: an All-Channel System and Experimental Study From Urban Hotspots to a Sold-Out Stadium . . . . . 2101--2114 Qixia Zhang and Fangming Liu and Chaobing Zeng Online Adaptive Interference-Aware VNF Deployment and Migration for 5G Network Slice . . . . . . . . . . . . . . . . . 2115--2128 Ahmed M. Bedewy and Yin Sun and Rahul Singh and Ness B. Shroff Low-Power Status Updates via Sleep-Wake Scheduling . . . . . . . . . . . . . . . 2129--2141 Dongxiao Yu and Yifei Zou and Jiguo Yu and Yu Wu and Weifeng Lv and Xiuzhen Cheng and Falko Dressler and Francis C. M. Lau Distributed Broadcasting in Dynamic Networks . . . . . . . . . . . . . . . . 2142--2155 Wenbin Liu and Yongjian Yang and En Wang and Hengzhi Wang and Zihe Wang and Jie Wu Dynamic Online User Recruitment With (Non-) Submodular Utility in Mobile CrowdSensing . . . . . . . . . . . . . . 2156--2169 Hongzi Zhu and Yuxiao Zhang and Zifan Liu and Xiao Wang and Shan Chang and Yingying Chen Localizing Acoustic Objects on a Single Phone . . . . . . . . . . . . . . . . . 2170--2183 Yuhang Ye and Brian Lee and Ronan Flynn and Jin Xu and Guiming Fang and Yuansong Qiao Delay-Based Network Utility Maximization Modelling for Congestion Control in Named Data Networking . . . . . . . . . 2184--2197 Anastasios Giovanidis and Bruno Baynat and Clémence Magnien and Antoine Vendeville Ranking Online Social Users by Their Influence . . . . . . . . . . . . . . . 2198--2214 Ouri Poupko and Gal Shahaf and Ehud Shapiro and Nimrod Talmon Building a Sybil-Resilient Digital Community Utilizing Trust-Graph Connectivity . . . . . . . . . . . . . . 2215--2227 Hongbo Jiang and Mengyuan Wang and Ping Zhao and Zhu Xiao and Schahram Dustdar A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs . . . . . 2228--2241 Jianghong Wei and Xiaofeng Chen and Jianfeng Ma and Xuexian Hu and Kui Ren Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging 2242--2253 Tianqi Yu and Xianbin Wang and Jianling Hu A Fast Hierarchical Physical Topology Update Scheme for Edge-Cloud Collaborative IoT Systems . . . . . . . 2254--2266 Zhenhua Han and Haisheng Tan and Shaofeng H.-C. Jiang and Wanli Cao and Xiaoming Fu and Lan Zhang and Francis C. M. Lau SPIN: BSP Job Scheduling With Placement-Sensitive Execution . . . . . 2267--2280 Federico Chiariotti and Andrea Zanella and Stepan Kucera and Kariem Fahmi and Holger Claussen The HOP Protocol: Reliable Latency-Bounded End-to-End Multipath Communication . . . . . . . . . . . . . 2281--2295 Luoyi Fu and Jiasheng Xu and Shan Qu and Zhiying Xu and Xinbing Wang and Guihai Chen Seeking the Truth in a Decentralized Manner . . . . . . . . . . . . . . . . . 2296--2312 Xin Yao and Rui Zhang and Dingquan Huang and Yanchao Zhang Verifiable Query Processing Over Outsourced Social Graph . . . . . . . . 2313--2326
Ran Ben-Basat and Gil Einziger and Shir Landau Feibish and Jalil Moraney and Bilal Tayh and Danny Raz Routing-Oblivious Network-Wide Measurements . . . . . . . . . . . . . . 2386--2398 Víctor Valls and George Iosifidis and Leandros Tassiulas Birkhoff's Decomposition Revisited: Sparse Scheduling for High-Speed Circuit Switches . . . . . . . . . . . . . . . . 2399--2412 Ajay Badita and Parimal Parag and Vaneet Aggarwal Single-Forking of Coded Subtasks for Straggler Mitigation . . . . . . . . . . 2413--2424 Melih Bastopcu and Sennur Ulukus Age of Information for Updates With Distortion: Constant and Age-Dependent Distortion Constraints . . . . . . . . . 2425--2438 Mohammad Jahanian and Jiachen Chen and K. K. Ramakrishnan Graph-Based Namespaces and Load Sharing for Efficient Information Dissemination 2439--2452 Van Sy Mai and Richard J. La and Abdella Battou Optimal Cybersecurity Investments in Large Networks Using SIS Model: Algorithm Design . . . . . . . . . . . . 2453--2466 Mahdieh Ahmadi and Morteza Golkarifard and Ali Movaghar and Hamed Yousefi Processor Sharing Queues With Impatient Customers and State-Dependent Rates . . 2467--2477 Chi Lin and Ziwei Yang and Haipeng Dai and Liangxian Cui and Lei Wang and Guowei Wu Minimizing Charging Delay for Directional Charging . . . . . . . . . . 2478--2493 Zun Yan and Peng Cheng and Zhuo Chen and Branka Vucetic and Yonghui Li Two-Dimensional Task Offloading for Mobile Networks: an Imitation Learning Framework . . . . . . . . . . . . . . . 2494--2507 Kan Yu and Jiguo Yu and Xiuzhen Cheng and Dongxiao Yu and Anming Dong Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading . . . . . . . . . . . . . . . . . 2508--2521 Beatriz Lorenzo and Francisco Javier González-Castaño and Linke Guo and Felipe Gil-Castiñeira and Yuguang Fang Autonomous Robustness Control for Fog Reinforcement in Dynamic Wireless Networks . . . . . . . . . . . . . . . . 2522--2535 Giovanni Neglia and Emilio Leonardi and Guilherme Iecker Ricardo and Thrasyvoulos Spyropoulos A Swiss Army Knife for Online Caching in Small Cell Networks . . . . . . . . . . 2536--2547 Vamseedhar Reddyvari and Sarat Chandra Bobbili and Parimal Parag and Srinivas Shakkottai Mode-Suppression: a Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks . . . . . . . . . . . . . . . . 2548--2559 Tom Barbette and Cyril Soldani and Laurent Mathy Combined Stateful Classification and Session Splicing for High-Speed NFV Service Chaining . . . . . . . . . . . . 2560--2573 Panagiotis Promponas and Christos Pelekis and Eirini Eleni Tsiropoulou and Symeon Papavassiliou Games in Normal and Satisfaction Form for Efficient Transmission Power Allocation Under Dual 5G Wireless Multiple Access Paradigm . . . . . . . . 2574--2587 Ravi Kiran Raman and Lav R. Varshney Coding for Scalable Blockchains via Dynamic Distributed Storage . . . . . . 2588--2601 Xuying Meng and Yequan Wang and Suhang Wang and Di Yao and Yujun Zhang Interactive Anomaly Detection in Dynamic Communication Networks . . . . . . . . . 2602--2615 Deliang Yang and Xuan Huang and Jun Huang and Xiangmao Chang and Guoliang Xing and Yang Yang A First Look at Energy Consumption of NB-IoT in the Wild: Tools and Large-Scale Measurement . . . . . . . . 2616--2631 Xianjin Xia and Yuanqing Zheng and Tao Gu LiteNap: Downclocking LoRa Reception . . 2632--2645 Shrayan Das and Kirtan Gopal Panda and Debarati Sen and Wasim Arif Maximizing Last-Minute Backup in Endangered Time-Varying Inter-Datacenter Networks . . . . . . . . . . . . . . . . 2646--2663 Xingpeng Fan and Hongli Xu and He Huang and Xuwei Yang Real-Time Update of Joint SFC and Routing in Software Defined Networks . . 2664--2677 Tong Li and Kai Zheng and Ke Xu and Rahul Arvind Jadhav and Tao Xiong and Keith Winstein and Kun Tan Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation . . . . . . . . . . . 2678--2692 Ying Wan and Haoyu Song and Yang Xu and Yilun Wang and Tian Pan and Chuwen Zhang and Yi Wang and Bin Liu T-Cache: Efficient Policy-Based Forwarding Using Small TCAM . . . . . . 2693--2708 Vignesh Sivaraman and Biplab Sikdar A Defense Mechanism Against Timing Attacks on User Privacy in ICN . . . . . 2709--2722 Mohammed Alasmar and George Parisis and Jon Crowcroft SCDP: Systematic Rateless Coding for Efficient Data Transport in Data Centers 2723--2736 Jiazheng Tian and Kun Xie and Xin Wang and Gaogang Xie and Kenli Li and Jigang Wen and Dafang Zhang and Jiannong Cao Efficiently Inferring Top-$k$ Largest Monitoring Data Entries Based on Discrete Tensor Completion . . . . . . . 2737--2750 Yuanyuan Li and Stratis Ioannidis Cache Networks of Counting Queues . . . 2751--2764 Xinyi Zhang and Gaogang Xie and Xin Wang and Penghao Zhang and Yanbiao Li and Kavé Salamatian Fast Online Packet Classification With Convolutional Neural Network . . . . . . 2765--2778 Tao Hou and Tao Wang and Zhuo Lu and Yao Liu Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation . . . . . . . . . . . . . . 2779--2792 Mingli Yu and Tian Xie and Ting He and Patrick McDaniel and Quinn K. Burke Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks 2793--2806
Kuan-Yin Chen and Sen Liu and Yang Xu and Ishant Kumar Siddhrau and Siyu Zhou and Zehua Guo and H. Jonathan Chao SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane . . . . . . . . . . . . . . . . . 1--17 Archana Bura and Desik Rengarajan and Dileep Kalathil and Srinivas Shakkottai and Jean-Francois Chamberland Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms 18--31 Rajarshi Bhattacharyya and Archana Bura and Desik Rengarajan and Mason Rumuly and Bainan Xia and Srinivas Shakkottai and Dileep Kalathil and Ricky K. P. Mok and Amogh Dhamdhere QFlow: a Learning Approach to High QoE Video Streaming at the Wireless Edge . . 32--46 Yi Ding and Ling Liu and Yu Yang and Yunhuai Liu and Desheng Zhang and Tian He From Conception to Retirement: a Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild . . . . . . . 47--61 Vahid Khalilpour Akram and Orhan Dagdeviren and Bulent Tavli A Coverage-Aware Distributed $k$-Connectivity Maintenance Algorithm for Arbitrarily Large $k$ in Mobile Sensor Networks . . . . . . . . . . . . 62--75 Jeman Park and Rhongho Jang and Manar Mohaisen and David Mohaisen A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet . . . 76--89 Xilai Liu and Yan Xu and Peng Liu and Tong Yang and Jiaqi Xu and Lun Wang and Gaogang Xie and Xiaoming Li and Steve Uhlig SEAD Counter: Self-Adaptive Counters With Different Counting Ranges . . . . . 90--106 Arani Bhattacharya and Caitao Zhan and Abhishek Maji and Himanshu Gupta and Samir R. Das and Petar M. Djuri\'c Selection of Sensors for Efficient Transmitter Localization . . . . . . . . 107--119 Bangbang Ren and Deke Guo and Yali Yuan and Guoming Tang and Weijun Wang and Xiaoming Fu Optimal Deployment of SRv6 to Enable Network Interconnection Service . . . . 120--133 Yu Zhang and Tao Gu and Xi Zhang MDLdroid: a ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing . . . . . . . . . . . . . . . . 134--147 Amirhossein Reisizadeh and Saurav Prakash and Ramtin Pedarsani and Amir Salman Avestimehr CodedReduce: a Fast and Robust Framework for Gradient Aggregation in Distributed Learning . . . . . . . . . . . . . . . . 148--161 Umut Can Çabuk and Mustafa Tosun and Orhan Dagdeviren MAX-Tree: a Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks . . . . . . . . . . . . . . . . 162--175 Zhiguo Shi and Guang Yang and Xiaowen Gong and Shibo He and Jiming Chen Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing 176--189 Xin Liu and Lei Ying Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin--Whitt Regime . . . . . . . 190--201 Muhammad Saad and Victor Cook and Lan Nguyen and My T. Thai and David Mohaisen Exploring Partitioning Attacks on the Bitcoin Network . . . . . . . . . . . . 202--214 Xiaoxi Zhang and Jianyu Wang and Li-Feng Lee and Tom Yang and Akansha Kalra and Gauri Joshi and Carlee Joe-Wong Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs 215--228 Cho-Hsin Tsai and Chih-Chun Wang Unifying AoI Minimization and Remote Estimation --- Optimal Sensor/Controller Coordination With Random Two-Way Delay 229--242 Xu Li and Feilong Tang and Yanmin Zhu and Luoyi Fu and Jiadi Yu and Long Chen and Jiacheng Liu Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs . . . . . . . . . . . . . . . . . 243--256 Chong Li and Sisu Xi and Chenyang Lu and Roch Guérin and Christopher D. Gill Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen 257--270 Yuchong Hu and Xiaoyang Zhang and Patrick P. C. Lee and Pan Zhou NCScale: Toward Optimal Storage Scaling via Network Coding . . . . . . . . . . . 271--284 Sheng Zhang and Can Wang and Yibo Jin and Jie Wu and Zhuzhong Qian and Mingjun Xiao and Sanglu Lu Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics . . . . . . . . . . . . 285--298 Chaoyi Ma and Shigang Chen and Youlin Zhang and Qingjun Xiao and Olufemi O. Odegbile Super Spreader Identification Using Geometric-Min Filter . . . . . . . . . . 299--312 Junjie Xie and Chen Qian and Deke Guo and Minmei Wang and Ge Wang and Honghui Chen COIN: an Efficient Indexing Mechanism for Unstructured Data Sharing Systems 313--326 Xiaoyi Pang and Zhibo Wang and Defang Liu and John C. S. Lui and Qian Wang and Ju Ren Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams . . . . . . . . . . . . . . . . 327--340 Tim Hellemans and Benny Van Houdt Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting . . . . . . . . . . . . . . . 341--353 Tom Barbette and Erfan Wu and Dejan Kosti\'c and Gerald Q. Maguire and Panagiotis Papadimitratos and Marco Chiesa Cheetah: a High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency . . . . . . . 354--367 Ning Chen and Tie Qiu and Zilong Lu and Dapeng Oliver Wu An Adaptive Robustness Evolution Algorithm With Self-Competition and its $3$D Deployment for Internet of Things 368--381 Reuven Cohen and Matty Kadosh and Alan Lo and Qasem Sayah LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless . . . . . . . . . . . . . . . 382--393 Xiaobo Ma and Jian Qu and Jianfeng Li and John C. S. Lui and Zhenhua Li and Wenmao Liu and Xiaohong Guan Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting . . . . . . . . . 394--408 Xuewei Feng and Qi Li and Kun Sun and Chuanpu Fu and Ke Xu Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID . . . . 409--422
Giovanni Neglia and Michele Garetto and Emilio Leonardi Similarity Caching: Theory and Algorithms . . . . . . . . . . . . . . . 475--486 Jianhan Song and Gustavo de Veciana and Sanjay Shakkottai Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback . . . . . . . . . . . . . . . . 487--500 Cuiying Feng and Jianwei An and Kui Wu and Jianping Wang Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography . . . . . . . . . . 501--514 Dapeng Qu and Guoxin Lv and Shijun Qu and Haiying Shen and Yue Yang and Zhaoyang Heng An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN . . . . . . . . . 515--528 Zhuo Li and Jindian Liu and Liu Yan and Beichuan Zhang and Peng Luo and Kaihua Liu Smart Name Lookup for NDN Forwarding Plane via Neural Networks . . . . . . . 529--541 Shuihai Hu and Gaoxiong Zeng and Wei Bai and Zilong Wang and Baochen Qiao and Kai Chen and Kun Tan and Yi Wang Aeolus: a Building Block for Proactive Transport in Datacenter Networks . . . . 542--556 Yu Sun and Chi Lin and Haipeng Dai and Pengfei Wang and Lei Wang and Guowei Wu and Qiang Zhang Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs 557--571 Shuai Wang and Jinkun Geng and Dan Li Impact of Synchronization Topology on DML Performance: Both Logical Topology and Physical Topology . . . . . . . . . 572--585 Yuanpeng Li and Xiang Yu and Yilong Yang and Yang Zhou and Tong Yang and Zhuo Ma and Shigang Chen Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement 586--600 Yan Huang and Shaoran Li and Y. Thomas Hou and Wenjing Lou GPF+\_: a Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NReee 601--615 Leonardo Lanante and Sumit Roy Performance Analysis of the IEEE 802.11ax OBSS\_PD-Based Spatial Reuse 616--628 Penghao Sun and Zehua Guo and Junfei Li and Yang Xu and Julong Lan and Yuxiang Hu Enabling Scalable Routing in Software-Defined Networks With Deep Reinforcement Learning on Critical Nodes 629--640 Xiuzhen Guo and Longfei Shangguan and Yuan He and Jia Zhang and Haotian Jiang and Awais Ahmad Siddiqi and Yunhao Liu Efficient Ambient LoRa Backscatter With On-Off Keying Modulation . . . . . . . . 641--654 Jorge Martín-Pérez and Francesco Malandrino and Carla Fabiana Chiasserini and Milan Groshev and Carlos J. Bernardos KPI Guarantees in Network Slicing . . . 655--668 Bahman Abolhassani and John Tadrous and Atilla Eryilmaz Single vs Distributed Edge Caching for Dynamic Content . . . . . . . . . . . . 669--682 Sergi Rene and Onur Ascigil and Ioannis Psaras and George Pavlou A Congestion Control Framework Based on In-Network Resource Pooling . . . . . . 683--697 Yuchen Liu and Yubing Jian and Raghupathy Sivakumar and Douglas M. Blough Maximizing Line-of-Sight Coverage for mmWave Wireless LANs With Multiple Access Points . . . . . . . . . . . . . 698--716 Hankun Cao and Qifa Yan and Xiaohu Tang and Guojun Han Adaptive Gradient Coding . . . . . . . . 717--734 Pan Lai and Rui Fan and Xiao Zhang and Wei Zhang and Fang Liu and Joey Tianyi Zhou Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems . . . . . . . . . . . . . . . . 735--748 Bingyu Li and Jingqiang Lin and Fengjun Li and Qiongxiao Wang and Wei Wang and Qi Li and Guangshen Cheng and Jiwu Jing and Congli Wang The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild . . . . . . . . 749--765 Ingo van Duijn and Peter Gjòl Jensen and Jesper Stenbjerg Jensen and Troels Beck Krògh and Jonas Sand Madsen and Stefan Schmid and Jirí Srba and Marc Tom Thorgersen Automata-Theoretic Approach to Verification of MPLS Networks Under Link Failures . . . . . . . . . . . . . . . . 766--781 Sabarish Krishna Moorthy and Maxwell Mcmanus and Zhangyu Guan ESN Reinforcement Learning for Spectrum and Flight Control in THz-Enabled Drone Networks . . . . . . . . . . . . . . . . 782--795 Kurian Polachan and Joydeep Pal and Chandramani Singh and T. V. Prabhakar and Fernando A. Kuipers TCPSbed: a Modular Testbed for Tactile Internet-Based Cyber-Physical Systems 796--811 Wenzheng Xu and Tao Xiao and Junqi Zhang and Weifa Liang and Zichuan Xu and Xuxun Liu and Xiaohua Jia and Sajal K. Das Minimizing the Deployment Cost of UAVs for Delay-Sensitive Data Collection in IoT Networks . . . . . . . . . . . . . . 812--825 Qiaolun Zhang and Omran Ayoub and Jun Wu and Francesco Musumeci and Gaolei Li and Massimo Tornatore Progressive Slice Recovery With Guaranteed Slice Connectivity After Massive Failures . . . . . . . . . . . . 826--839 Tzu-Hsuan Liu and Che-Hao Yu and Yi-Jheng Lin and Chia-Ming Chang and Cheng-Shang Chang and Duan-Shin Lee ALOHA Receivers: a Network Calculus Approach for Analyzing Coded Multiple Access With SIC . . . . . . . . . . . . 840--854 Renyong Wu and Jieming Ma and Zhixiang Tang and Xiehua Li and Kim-Kwang Raymond Choo A Generic Secure Transmission Scheme Based on Random Linear Network Coding 855--866 Chenghao Rong and Jessie Hui Wang and Juncai Liu and Jilong Wang and Fenghua Li and Xiaolei Huang Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics . . . . . . . . . . . . . . . 867--880 Wenzheng Xu and Yueying Sun and Rui Zou and Weifa Liang and Qiufen Xia and Feng Shan and Tian Wang and Xiaohua Jia and Zheng Li Throughput Maximization of UAV Networks 881--895 Yanjiao Chen and Meng Xue and Jian Zhang and Runmin Ou and Qian Zhang and Peng Kuang \em DetectDUI: an In-Car Detection System for Drink Driving and BACs . . . 896--910
Ibrahim Kettaneh and Ahmed Alquraan and Hatem Takruri and Ali José Mashtizadeh and Samer Al-Kiswany Accelerating Reads With In-Network Consistency-Aware Load Balancing . . . . 954--968 Zehua Guo and Songshi Dou and Sen Liu and Wendi Feng and Wenchao Jiang and Yang Xu and Zhi-Li Zhang Maintaining Control Resiliency and Flow Programmability in Software-Defined WANs During Controller Failures . . . . . . . 969--984 Yaniv Sadeh and Ori Rottenstreich and Haim Kaplan Optimal Weighted Load Balancing in TCAMs 985--998 Zhixiong Niu and Qiang Su and Peng Cheng and Yongqiang Xiong and Dongsu Han and Keith Winstein and Chun Jason Xue and Hong Xu NetKernel: Making Network Stack Part of the Virtualized Infrastructure . . . . . 999--1013 Yordanos Tibebu Woldeyohannes and Besmir Tola and Yuming Jiang and K. K. Ramakrishnan CoShare: an Efficient Approach for Redundancy Allocation in NFV . . . . . . 1014--1028 Zhengkai Shi and Yipeng Zhou and Di Wu and Chen Wang PPVC: Online Learning Toward Optimized Video Content Caching . . . . . . . . . 1029--1044 Ehsan Mohammadpour and Jean-Yves Le Boudec On Packet Reordering in Time-Sensitive Networks . . . . . . . . . . . . . . . . 1045--1057 Khashayar Kamran and Edmund Yeh and Qian Ma DECO: Joint Computation Scheduling, Caching, and Communication in Data-Intensive Computing Networks . . . 1058--1072 Alon Rashelbach and Ori Rottenstreich and Mark Silberstein A Computational Approach to Packet Classification . . . . . . . . . . . . . 1073--1087 Hao Li and Peng Zhang and Guangda Sun and Wanyue Cao and Chengchen Hu and Danfeng Shan and Tian Pan and Qiang Fu Compiling Cross-Language Network Programs Into Hybrid Data Plane . . . . 1088--1103 Shuai Tong and Jiliang Wang and Yunhao Liu Combating Packet Collisions Using Non-Stationary Signal Scaling in LPWANs 1104--1117 Jia Liu and Xi Yu and Xuan Liu and Xingyu Chen and Haisong Liu and Yanyan Wang and Lijun Chen Time-Efficient Range Detection in Commodity RFID Systems . . . . . . . . . 1118--1131 Kaiyang Liu and Jun Peng and Jingrong Wang and Jianping Pan Optimal Caching for Low Latency in Distributed Coded Storage Systems . . . 1132--1145 Jingzhou Wang and Gongming Zhao and Hongli Xu and Yutong Zhai and Qianyu Zhang and He Huang and Yongqiang Yang A Robust Service Mapping Scheme for Multi-Tenant Clouds . . . . . . . . . . 1146--1161 Sijie Xiong and Anand D. Sarwate and Narayan B. Mandayam Network Traffic Shaping for Enhancing Privacy in IoT Systems . . . . . . . . . 1162--1177 Chongrong Fang and Haoyu Liu and Mao Miao and Jie Ye and Lei Wang and Wansheng Zhang and Daxiang Kang and Biao Lyu and Shunmin Zhu and Peng Cheng and Jiming Chen Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network . . . . . . . . . . . . 1178--1192 Hehuan Shi and Lin Chen Downlink Transmission Scheduling With Data Sharing . . . . . . . . . . . . . . 1193--1202 Qingyu Liu and Haibo Zeng and Minghua Chen Minimizing AoI With Throughput Requirements in Multi-Path Network Communication . . . . . . . . . . . . . 1203--1216 Fernando Pérez-Bueno and Luz García and Gabriel Maciá-Fernández and Rafael Molina Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection . . . . . . . 1217--1229 Huaqing Tu and Gongming Zhao and Hongli Xu and Yangming Zhao and Yutong Zhai A Robustness-Aware Real-Time SFC Routing Update Scheme in Multi-Tenant Clouds . . 1230--1244 Hehuan Shi and Lin Chen From Spectrum Bonding to Contiguous-Resource Batching Task Scheduling . . . . . . . . . . . . . . . 1245--1254 Qiong Wu and Kaiwen He and Xu Chen and Shuai Yu and Junshan Zhang Deep Transfer Learning Across Cities for Mobile Traffic Prediction . . . . . . . 1255--1267 Abdalla Hussein and Catherine Rosenberg and Patrick Mitran Hybrid NOMA in Multi-Cell Networks: From a Centralized Analysis to Practical Schemes . . . . . . . . . . . . . . . . 1268--1282 Yiwen Qi and Wenke Yu and Xudong Zhao and Xindi Xu Event-Triggered Control for Network-Based Switched Systems With Switching Signals Subject to Dual-Terminal DoS Attacks . . . . . . . 1283--1293 Chaoyun Zhang and Xavier Costa-Pérez and Paul Patras Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms 1294--1311 Guocheng Liao and Xu Chen and Jianwei Huang Privacy-Aware Online Social Networking With Targeted Advertisement . . . . . . 1312--1327 Hongyi Zhou and Kefan Lv and Longbo Huang and Xiongfeng Ma Quantum Network: Security Assessment and Key Management . . . . . . . . . . . . . 1328--1339 Yanyan Han and Hongyi Wu Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks 1340--1351 Jian An and Zhenxing Wang and Xin He and Xiaolin Gui and Jindong Cheng and Ruowei Gui PPQC: a Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications 1352--1367 Zhiyuan Wang and Jiancheng Ye and Dong Lin and Yipei Chen and John C. S. Lui Approximate and Deployable Shortest Remaining Processing Time Scheduler . . 1368--1381
Ran Ben Basat and Gil Einziger and Isaac Keslassy and Ariel Orda and Shay Vargaftik and Erez Waisbard Memento: Making Sliding Windows Efficient for Heavy Hitters . . . . . . 1440--1453 Junghoon Kim and Taejoon Kim and Morteza Hashemi and David J. Love and Christopher G. Brinton Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks 1454--1468 Jie Zhao and Xin Wang On the Efficiency of Multi-Beam Medium Access for Millimeter-Wave Networks . . 1469--1480 Xuedou Xiao and Wei Wang and Tao Jiang Sensor-Assisted Rate Adaptation for UAV MU-MIMO Networks . . . . . . . . . . . . 1481--1493 Akshay Jajoo and Y. Charlie Hu and Xiaojun Lin A Case for Sampling-Based Learning Techniques in Coflow Scheduling . . . . 1494--1508 Rahul Vaze and Jayakrishnan Nair Speed Scaling on Parallel Servers With MapReduce Type Precedence Constraints 1509--1524 Yuntao Wang and Weiwei Chen and Tom H. Luan and Zhou Su and Qichao Xu and Ruidong Li and Nan Chen Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks . . 1525--1539 Michael J. Neely A Converse Result on Convergence Time for Opportunistic Wireless Scheduling 1540--1553 Hassan Iqbal and Anand Singh and Muhammad Shahzad Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants . . . . . . . . . 1554--1568 Seyyedali Hosseinalipour and Sheikh Shams Azam and Christopher G. Brinton and Nicol\`o Michelusi and Vaneet Aggarwal and David J. Love and Huaiyu Dai Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks . . . . . . . . . . . . . . . . 1569--1584 Deepak Nadig and Byrav Ramamurthy and Brian Bockelman SNAG: SDN-Managed Network Architecture for GridFTP Transfers Using Application-Awareness . . . . . . . . . 1585--1598 Zhuozhao Li and Haiying Shen Co-Scheduler: a Coflow-Aware Data-Parallel Job Scheduler in Hybrid Electrical/Optical Datacenter Networks 1599--1612 Jun Du and Chunxiao Jiang and Abderrahim Benslimane and Song Guo and Yong Ren SDN-Based Resource Allocation in Edge and Cloud Computing Systems: an Evolutionary Stackelberg Differential Game Approach . . . . . . . . . . . . . 1613--1628 Guanglei Song and Jiahai Yang and Zhiliang Wang and Lin He and Jinlei Lin and Long Pan and Chenxin Duan and Xiaowen Quan DET: Enabling Efficient Probing of IPv6 Active Addresses . . . . . . . . . . . . 1629--1643 Zhuozhao Li and Tanmoy Sen and Haiying Shen and Mooi Choo Chuah A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes 1644--1658 Alden Hilton and Joel Hirschmann and Casey Deccio Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities . . . . . . . . 1659--1673 Haibo Wang and Chaoyi Ma and Shigang Chen and Yuanda Wang Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps . . . . . . . . 1674--1688 Xiao-Yan Li and Wanling Lin and Jou-Ming Chang and Xiaohua Jia Transmission Failure Analysis of Multi-Protection Routing in Data Center Networks With Heterogeneous Edge-Core Servers . . . . . . . . . . . . . . . . 1689--1702 Yunxiang Cai and Hongzi Zhu and Shan Chang and Xiao Wang and Jiangang Shen and Minyi Guo PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing . . . . . . . . . . . . . . . . 1703--1716 Chang Liu and Jean Tourrilhes and Chen-Nee Chuah and Puneet Sharma Voyager: Revisiting Available Bandwidth Estimation With a New Class of Methods --- Decreasing- Chirp-Train Methods . . 1717--1732 Edwin Yang and Song Fang and Ian Markwood and Yao Liu and Shangqing Zhao and Zhuo Lu and Haojin Zhu Wireless Training-Free Keystroke Inference Attack and Defense . . . . . . 1733--1748 Swaroop Gopalam and Stephen V. Hanly and Philip Whiting Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul . . . . . . . . . . . . . . 1749--1764 Junsong Fu and Na Wang and Leyao Nie and Baojiang Cui and Bharat K. Bhargava Defending Trace-Back Attack in $3$D Wireless Internet of Things . . . . . . 1765--1779 Ehsan Mohammadpour and Jean-Yves Le Boudec Analysis of Dampers in Time-Sensitive Networks With Non-Ideal Clocks . . . . . 1780--1794 Zaid H. Nasralla and Taisir E. H. Elgorashi and Ali Hammadi and Mohamed O. I. Musa and Jaafar M. H. Elmirghani Blackout Resilient Optical Core Network 1795--1806 Yuting Wang and Xiaolong Zheng and Liang Liu and Huadong Ma PolarTracker: Attitude-Aware Channel Access for Floating Low Power Wide Area Networks . . . . . . . . . . . . . . . . 1807--1821 Artur Sterz and Patrick Felka and Bernd Simon and Sabrina Klos and Anja Klein and Oliver Hinz and Bernd Freisleben Multi-Stakeholder Service Placement via Iterative Bargaining With Incomplete Information . . . . . . . . . . . . . . 1822--1837 Chen Avin and Kaushik Mondal and Stefan Schmid Demand-Aware Network Design With Minimal Congestion and Route Lengths . . . . . . 1838--1848 Kaiping Xue and Peixuan He and Jiayu Yang and Qiudong Xia and David S. L. Wei SCD2: Secure Content Delivery and Deduplication With Multiple Content Providers in Information Centric Networking . . . . . . . . . . . . . . . 1849--1864 Sladana Jo\vsilo and György Dán Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection . . . . . . . . . . . . 1865--1878
Ji\vrí Matou\vsek and Adam Lu\vcanský and David Jane\vcek and Jozef Sabo and Jan Ko\vrenek and Gianni Antichi ClassBench-ng: Benchmarking Packet Classification Algorithms in the OpenFlow Era . . . . . . . . . . . . . . 1912--1925 Mohammad Jahanian and K. K. Ramakrishnan CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming With Application to Emergency Response . . . . . . . . . . . 1926--1939 Nilanjan Biswas and Goutam Das and Priyadip Ray Buffer-Aware User Selection and Resource Allocation for an Opportunistic Cognitive Radio Network: a Cross-Layer Approach . . . . . . . . . . . . . . . . 1940--1954 Kun Xie and Jiazheng Tian and Xin Wang and Gaogang Xie and Jiannong Cao and Hongbo Jiang and Jigang Wen Fast Retrieval of Large Entries With Incomplete Measurement Data . . . . . . 1955--1969 Sushovan Das and Afsaneh Rahbar and Xinyu Crystal Wu and Zhuang Wang and Weitao Wang and Ang Chen and T. S. Eugene Ng Shufflecast: an Optical, Data-Rate Agnostic, and Low-Power Multicast Architecture for Next-Generation Compute Clusters . . . . . . . . . . . . . . . . 1970--1985 Hai-Anh Tran and Duc Tran and Abdelhamid Mellouk State-Dependent Multi-Constraint Topology Configuration for Software-Defined Service Overlay Networks . . . . . . . . . . . . . . . . 1986--2001 Nurullah Karakoç and Anna Scaglione and Martin Reisslein and Ruiyuan Wu Federated Edge Network Utility Maximization for a Multi-Server System: Algorithm and Convergence . . . . . . . 2002--2017 Pooja Vyavahare and Jayakrishnan Nair and D. Manjunath Sponsored Data: On the Effect of ISP Competition on Pricing Dynamics and Content Provider Market Structures . . . 2018--2031 Zhenghao Zhang and Raghav Rathi and Steven Perez and Jumana Bukhari and Yaoguang Zhong ZCNET: Achieving High Capacity in Low Power Wide Area Networks . . . . . . . . 2032--2045 Chengzhang Li and Qingyu Liu and Shaoran Li and Yongce Chen and Y. Thomas Hou and Wenjing Lou and Sastry Kompella Scheduling With Age of Information Guarantee . . . . . . . . . . . . . . . 2046--2059 Meng Li and Liehuang Zhu and Zijian Zhang and Chhagan Lal and Mauro Conti and Mamoun Alazab User-Defined Privacy-Preserving Traffic Monitoring Against $n$-by-1 Jamming Attack . . . . . . . . . . . . . . . . . 2060--2073 Gaoxiong Zeng and Wei Bai and Ge Chen and Kai Chen and Dongsu Han and Yibo Zhu and Lei Cui Congestion Control for Cross-Datacenter Networks . . . . . . . . . . . . . . . . 2074--2089 Chun Li and Yunyun Yang and Hui Liang and Boying Wu Learning Quantum Drift-Diffusion Phenomenon by Physics-Constraint Machine Learning . . . . . . . . . . . . . . . . 2090--2101 Kevin D. Smith and Saber Jafarpour and Ananthram Swami and Francesco Bullo Topology Inference With Multivariate Cumulants: The Möbius Inference Algorithm 2102--2116 Guangyang Zeng and Biqiang Mu and Jieqiang Wei and Wing Shing Wong and Junfeng Wu Localizability With Range-Difference Measurements: Numerical Computation and Error Bound Analysis . . . . . . . . . . 2117--2130 Yunshu Liu and Zhixuan Fang and Man Hon Cheung and Wei Cai and Jianwei Huang An Incentive Mechanism for Sustainable Blockchain Storage . . . . . . . . . . . 2131--2144 Hui Yang and Qiuyan Yao and Bowen Bao and Ao Yu and Jie Zhang and Athanasios V. Vasilakos Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks . . . . . . . . . . . . . . . . 2145--2157 Renjie Xie and Jiahao Cao and Qi Li and Kun Sun and Guofei Gu and Mingwei Xu and Yuan Yang Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures . . . . . . . . . . . . 2158--2172 Lin Dai A Theoretical Framework for Random Access: Stability Regions and Transmission Control . . . . . . . . . . 2173--2200 Xuezheng Liu and Zhicong Zhong and Yipeng Zhou and Di Wu and Xu Chen and Min Chen and Quan Z. Sheng Accelerating Federated Learning via Parallel Servers: a Theoretically Guaranteed Approach . . . . . . . . . . 2201--2215 Seyed Mohammadhossein Tabatabaee and Jean-Yves Le Boudec Deficit Round-Robin: a Second Network Calculus Analysis . . . . . . . . . . . 2216--2230 Feng Li and Jichao Zhao and Dongxiao Yu and Xiuzhen Cheng and Weifeng Lv Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers . . . . . . . . . . . . . . . . 2231--2245 Hongli Xu and Peng Xi and Gongming Zhao and Jianchun Liu and Chen Qian and Liusheng Huang SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks . . . 2246--2261 Lin Chen and Shan Lin and Hua Huang and Weihua Yang Charging Path Optimization in Mobile Networks . . . . . . . . . . . . . . . . 2262--2273 Lei Zhang and Yong Cui and Mowei Wang and Kewei Zhu and Yibo Zhu and Yong Jiang DeepCC: Bridging the Gap Between Congestion Control and Applications via Multiobjective Optimization . . . . . . 2274--2288 Minghui Liwang and Xianbin Wang Overbooking-Empowered Computing Resource Provisioning in Cloud-Aided Mobile Edge Networks . . . . . . . . . . . . . . . . 2289--2303 Lei Shi and Yuhua Cheng and Jinliang Shao and Qingchen Liu and Wei Xing Zheng Locating Link Failures in WSNs via Cluster Consensus and Graph Decomposition . . . . . . . . . . . . . 2304--2314 Bahman Abolhassani and John Tadrous and Atilla Eryilmaz and Edmund Yeh Fresh Caching of Dynamic Content Over the Wireless Edge . . . . . . . . . . . 2315--2327 Zhenlin An and Qiongzheng Lin and Lei Yang and Lei Xie Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost . . . . . . . . . . . 2328--2342 Hyunseok Chang and Matteo Varvello and Fang Hao and Sarit Mukherjee A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet . . 2343--2358
Zhenhua Han and Haisheng Tan and Rui Wang and Yuncong Hong and Francis C. M. Lau Efficient Online Learning Based Cross-Tier Uplink Scheduling in HetNets 2389--2402 Gregor Bankhamer and Robert Elsässer and Stefan Schmid Local Fast Rerouting With Low Congestion: a Randomized Approach . . . 2403--2418 Chen Avin and Kaushik Mondal and Stefan Schmid Push-Down Trees: Optimal Self-Adjusting Complete Trees . . . . . . . . . . . . . 2419--2432 Tian Xie and Namitha Nambiar and Ting He and Patrick McDaniel Attack Resilience of Cache Replacement Policies: a Study Based on TTL Approximation . . . . . . . . . . . . . 2433--2447 Marcel Blöcher and Lin Wang and Patrick Eugster and Max Schmidt Holistic Resource Scheduling for Data Center In-Network Computing . . . . . . 2448--2463 Theo Jepsen and Ali Fattaholmanan and Masoud Moshref and Nate Foster and Antonio Carzaniga and Robert Soulé Forwarding and Routing With Packet Subscriptions . . . . . . . . . . . . . 2464--2479 Tianjiao Wang and Zengfu Wang and Bill Moran and Moshe Zukerman Submarine Cable Network Design for Regional Connectivity . . . . . . . . . 2480--2492 Xiaozhe Shao and Zibin Chen and Daniel Holcomb and Lixin Gao Accelerating BGP Configuration Verification Through Reducing Cycles in SMT Constraints . . . . . . . . . . . . 2493--2504 Yang Cai and Jaime Llorca and Antonia M. Tulino and Andreas F. Molisch Ultra-Reliable Distributed Cloud Network Control With End-to-End Latency Constraints . . . . . . . . . . . . . . 2505--2520 Reena Chackochan and Albert Sunny and Senthilkumar Dhanasekaran Approximate Aggregate Utility Maximization Using Greedy Maximal Scheduling . . . . . . . . . . . . . . . 2521--2530 Massieh Kordi Boroujeny and Brian L. Mark Design of a Stochastic Traffic Regulator for End-to-End Network Delay Guarantees 2531--2543 Darryl Veitch and Sathiya Kumaran Mani and Yi Cao and Paul Barford iHorology: Lowering the Barrier to Microsecond-Level Internet Time . . . . 2544--2558 Sijiang Huang and Mowei Wang and Yong Cui Traffic-Aware Buffer Management in Shared Memory Switches . . . . . . . . . 2559--2573 Qingfeng Tan and Xuebin Wang and Wei Shi and Jian Tang and Zhihong Tian An Anonymity Vulnerability in Tor . . . 2574--2587 Xuehe Wang and Lingjie Duan Dynamic Pricing and Mean Field Analysis for Controlling Age of Information . . . 2588--2600 Zichuan Xu and Haozhe Ren and Weifa Liang and Qiufen Xia and Wanlei Zhou and Pan Zhou and Wenzheng Xu and Guowei Wu and Mingchu Li Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks . . . . . . . . . . . . . 2601--2615 Xianhao Chen and Guangyu Zhu and Haichuan Ding and Lan Zhang and Haixia Zhang and Yuguang Fang End-to-End Service Auction: a General Double Auction Mechanism for Edge Computing Services . . . . . . . . . . . 2616--2629 Keerthi Priya Dasala and Josep M. Jornet and Edward W. Knightly Scaling mmWave WLANs With Single RF Chain Multiuser Beamforming . . . . . . 2630--2643 Tie Qiu and Lidi Zhang and Ning Chen and Songwei Zhang and Wenyuan Liu and Dapeng Oliver Wu Born This Way: a Self-Organizing Evolution Scheme With Motif for Internet of Things Robustness . . . . . . . . . . 2644--2657 Zhiyuan Yao and Yoann Desmouceaux and Juan-Antonio Cordero-Fuertes and Mark Townsley and Thomas Clausen HLB: Toward Load-Aware Load Balancing 2658--2673 Itamar Cohen and Gil Einziger and Gabriel Scalosub False Negative Awareness in Indicator-Based Caching Systems . . . . 2674--2687 Dianxiong Liu and Zhiyong Du and Xiaodu Liu and Heyu Luan and Yitao Xu and Yifan Xu Task-Based Network Reconfiguration in Distributed UAV Swarms: a Bilateral Matching Approach . . . . . . . . . . . 2688--2700 Ludovic Thomas and Ahlem Mifdaoui and Jean-Yves Le Boudec Worst-Case Delay Bounds in Time-Sensitive Networks With Packet Replication and Elimination . . . . . . 2701--2715 Zhiwei Zhao and Wenliang Mao and Geyong Min and Weifeng Gao Joint Multichannel-Spatial Diversity for Efficient Opportunistic Routing in Low-Power Wireless Networks . . . . . . 2716--2729 Miao Zhang and Yifei Zhu and Jiangchuan Liu and Feng Wang and Fangxin Wang CharmSeeker: Automated Pipeline Configuration for Serverless Video Processing . . . . . . . . . . . . . . . 2730--2743 Luoyi Fu and Jiapeng Zhang and Shan Qu and Huquan Kang and Xinbing Wang and Guihai Chen Measuring Social Network De-Anonymizability by Means of Morphism Property . . . . . . . . . . . . . . . . 2744--2759 Yao Xin and Wenjun Li and Guoming Tang and Tong Yang and Xiaohe Hu and Yi Wang FPGA-Based Updatable Packet Classification Using TSS-Combined Bit-Selecting Tree . . . . . . . . . . . 2760--2775 Nishant Shakya and Fan Li and Jinyuan Chen On Distributed Computing With Heterogeneous Communication Constraints 2776--2787 Xinzhe Fu and Eytan Modiano Learning-NUM: Network Utility Maximization With Unknown Utility Functions and Queueing Delay . . . . . . 2788--2803 Zhirong Shen and Guanglin Zhang Competitive Online Stay-or-Switch Algorithms With Minimum Commitment and Switching Cost . . . . . . . . . . . . . 2804--2817
Huikang Li and Yi Gao and Wei Dong and Chun Chen Bound-Based Network Tomography for Inferring Interesting Path Metrics . . . 1--14 Eric Ruzomberkaand and David J. Love Interference Moral Hazard in Large Multihop Networks . . . . . . . . . . . 15--29 Anirudh Sabnis and Tareq Si Salem and Giovanni Neglia and Michele Garetto and Emilio Leonardi and Ramesh K. Sitaraman GRADES: Gradient Descent for Similarity Caching . . . . . . . . . . . . . . . . 30--41 Xi Chen and Qiao Xiang and Linghe Kong and Huisan Xu and Xue Liu Learning From FM Communications: Toward Accurate, Efficient, All-Terrain Vehicle Localization . . . . . . . . . . . . . . 42--57 Haoyu Wang and Zetian Liu and Haiying Shen Machine Learning Feature Based Job Scheduling for Distributed Machine Learning Clusters . . . . . . . . . . . 58--73 Xujin Zhou and Irem Koprulu and Atilla Eryilmaz and Michael J. Neely Efficient Distributed MAC for Dynamic Demands: Congestion and Age Based Designs . . . . . . . . . . . . . . . . 74--87 Federico Mason and Gianfranco Nencioni and Andrea Zanella Using Distributed Reinforcement Learning for Resource Orchestration in a Network Slicing Scenario . . . . . . . . . . . . 88--102 Jiao Zhang and Xiaolong Zhong and Zirui Wan and Yu Tian and Tian Pan and Tao Huang RCC: Enabling Receiver-Driven RDMA Congestion Control With Congestion Divide-and-Conquer in Datacenter Networks . . . . . . . . . . . . . . . . 103--117 Shaopeng Zhu and Xiaolong Zheng and Liang Liu and Huadong Ma CSMA/PJ: a Protective Jamming Based MAC Protocol to Harmonize the Long and Short Links . . . . . . . . . . . . . . . . . 118--132 Konstantinos Oikonomou and George Koufoudakis and Sonia A\"\issa and Ioannis Stavrakakis Probabilistic Flooding Performance Analysis Exploiting Graph Spectra Properties . . . . . . . . . . . . . . . 133--146 Juncheng Wang and Min Dong and Ben Liang and Gary Boudreau and Hatem Abou-Zeid Delay-Tolerant OCO With Long-Term Constraints: Algorithm and Its Application to Network Resource Allocation . . . . . . . . . . . . . . . 147--163 Xiaochun Yun and Yipeng Wang and Yongzheng Zhang and Chen Zhao and Zijian Zhao Encrypted TLS Traffic Classification on Cloud Platforms . . . . . . . . . . . . 164--177 Shouxi Luo and Pingzhi Fan and Huanlai Xing and Hongfang Yu Meeting Coflow Deadlines in Data Center Networks With Policy-Based Selective Completion . . . . . . . . . . . . . . . 178--191 Zhehui Zhang and Yuanjie Li and Qianru Li and Jinghao Zhao and Ghufran Baig and Lili Qiu and Songwu Lu Movement-Based Reliable Mobility Management for Beyond 5G Cellular Networks . . . . . . . . . . . . . . . . 192--207 Tongyu Zong and Chen Li and Yuanyuan Lei and Guangyu Li and Houwei Cao and Yong Liu Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity With Ensemble Learning . . . . . . . . . . . 208--219 Cao Chen and Fen Zhou and Massimo Tornatore and Shilin Xiao Maximizing Revenue With Adaptive Modulation and Multiple FECs in Flexible Optical Networks . . . . . . . . . . . . 220--233 Chia-Ming Chang and Yi-Jheng Lin and Cheng-Shang Chang and Duan-Shin Lee On the Stability Regions of Coded Poisson Receivers With Multiple Classes of Users and Receivers . . . . . . . . . 234--247 Gongming Zhao and Luyao Luo and Hongli Xu and Chun-Jen Chung and Liguang Xie Southbound Message Delivery With Virtual Network Topology Awareness in Clouds . . 248--263 Francesco Malandrino and Carla Fabiana Chiasserini and Nuria Molner and Antonio de la Oliva Network Support for High-Performance Distributed Machine Learning . . . . . . 264--278 Chao Xu and Jessie Hui Wang and Jilong Wang and Tao Yu and Yipeng Zhou and Yuedong Xu and Di Wu and Changqing An Offloading Elastic Transfers to Opportunistic Vehicular Networks Based on Imperfect Trajectory Prediction . . . 279--293 João Luís Sobrinho and Miguel Alves Ferreira From Non-Optimal Routing Protocols to Routing on Multiple Optimality Criteria 294--307 Xudong Qin and Bin Li and Lei Ying Efficient Distributed Threshold-Based Offloading for Large-Scale Mobile Cloud Computing . . . . . . . . . . . . . . . 308--321 Akbar Majidi and Xiaofeng Gao and Shunjia Zhu and Nazila Jahanbakhsh and Jiaqi Zheng and Guihai Chen MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers . . . . . . . . . . . . . . . . 322--335 Ge Wang and Xiaofeng Shi and Haofan Cai and Chen Qian and Han Ding and Wei Xi and Kun Zhao and Jizhong Zhao and Jinsong Han A Generalized Method to Combat Multipaths for RFID Sensing . . . . . . 336--351 Chi Zhang and Haisheng Tan and Haoqiang Huang and Zhenhua Han and Shaofeng H.-C. Jiang and Guopeng Li and Xiang-Yang Li Online Approximation Scheme for Scheduling Heterogeneous Utility Jobs in Edge Computing . . . . . . . . . . . . . 352--365 Qiang Wu and Xiangping Bryce Zhai and Xi Liu and Chun-Ming Wu and Fangliang Lou and Hongke Zhang Performance Tuning via Lean Measurements for Acceleration of Network Functions Virtualization . . . . . . . . . . . . . 366--379 Yijun Hao and Fang Li and Cong Zhao and Shusen Yang Delay-Oriented Scheduling in 5G Downlink Wireless Networks Based on Reinforcement Learning With Partial Observations . . . 380--394 Shaoke Xi and Kai Bu and Wensen Mao and Xiaoyu Zhang and Kui Ren and Xinxin Ren RuleOut Forwarding Anomalies for SDN . . 395--407 Jiayu Pan and Ahmed M. Bedewy and Yin Sun and Ness B. Shroff Optimal Sampling for Data Freshness: Unreliable Transmissions With Random Two-Way Delay . . . . . . . . . . . . . 408--420 Shaofei Tang and Sicheng Zhao and Xiaoqin Pan and Zuqing Zhu How to Use In-Band Network Telemetry Wisely: Network-Wise Orchestration of Sel-INT . . . . . . . . . . . . . . . . 421--435
Hao-Hsuan Chang and Hao Chen and Jianzhong Zhang and Lingjia Liu Decentralized Deep Reinforcement Learning Meets Mobility Load Balancing 473--484 Yunhua He and Yueting Wu and Cui Zhang and Jialong Shen and Ke Xiao and Keshav Sood and Limin Sun A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model 485--496 Tuo Shi and Zhipeng Cai and Jianzhong Li and Hong Gao and Jiancheng Chen and Ming Yang Services Management and Distributed Multihop Requests Routing in Mobile Edge Networks . . . . . . . . . . . . . . . . 497--510 Kai Lei and Guanjie Lin and Meimei Zhang and Keke Li and Qi Li and Xiaojun Jing and Peng Wang Measuring the Consistency Between Data and Control Plane in SDN . . . . . . . . 511--525 Xinle Du and Ke Xu and Lei Xu and Kai Zheng and Meng Shen and Bo Wu and Tong Li R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers 526--541 Yi Zhao and Meina Qiao and Haiyang Wang and Rui Zhang and Dan Wang and Ke Xu Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework . . . . . . . . . . . . . . . 542--557 Haibo Wang and Chaoyi Ma and Olufemi O. Odegbile and Shigang Chen and Jih-Kwon Peir Randomized Error Removal for Online Spread Estimation in High-Speed Networks 558--573 Yi Ding and Yu Yang and Wenchao Jiang and Yunhuai Liu and Tian He and Desheng Zhang Nationwide Deployment and Operation of a Virtual Arrival Detection System in the Wild . . . . . . . . . . . . . . . . . . 574--589 Lili Chen and Kai Chen and Jie Xiong and Ke Li and Sunghoon Ivan Lee and Fuwei Wang and Zhanyong Tang and Zheng Wang and Dingyi Fang and Xiaojiang Chen Toward Wide-Area Contactless Wireless Sensing . . . . . . . . . . . . . . . . 590--605 François Michel and Alejandro Cohen and Derya Malak and Quentin De Coninck and Muriel Médard and Olivier Bonaventure FlEC: Enhancing QUIC With Application-Tailored Reliability Mechanisms . . . . . . . . . . . . . . . 606--619 Xiang Tian and Baoxian Zhang and Cheng Li Distributed Stable Multisource Global Broadcast for SINR-Based Wireless Multihop Networks . . . . . . . . . . . 620--633 Yixin Bao and Yanghua Peng and Chuan Wu Deep Learning-Based Job Placement in Distributed Machine Learning Clusters With Heterogeneous Workloads . . . . . . 634--647 En Wang and Mijia Zhang and Wenbin Liu and Haoyi Xiong and Bo Yang and Yongjian Yang and Jie Wu Outlier-Concerned Data Completion Exploiting Intra- and Inter-Data Correlations in Sparse CrowdSensing . . 648--663 Na Ruan and Hanyi Sun and Zenan Lou and Jie Li A General Quantitative Analysis Framework for Attacks in Blockchain . . 664--679 Waseem Ozan and Izzat Darwazeh and Kyle Jamieson Partial OFDM Symbol Recovery to Improve Interfering Wireless Networks Operation in Collision Environments . . . . . . . 680--694 Feridun Tütüncüo\uglu and Sla\dbarana Jo\vsilo and György Dán Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing . . . . . . . 695--709 Jianpeng Qi and Rui Wang R2: a Distributed Remote Function Execution Mechanism With Built-In Metadata . . . . . . . . . . . . . . . . 710--723 Lu Tang and Yao Xiao and Qun Huang and Patrick P. C. Lee A High-Performance Invertible Sketch for Network-Wide Superspreader Detection . . 724--737 Jiawei Huang and Wenlu Zhang and Yijun Li and Lin Li and Zhaoyi Li and Jin Ye and Jianxin Wang ChainSketch: an Efficient and Accurate Sketch for Heavy Flow Detection . . . . 738--753 Mukhtiar Ahmad and Syed Muhammad Nawazish Ali and Muhammad Taimoor Tariq and Syed Usman Jafri and Adnan Abbas and Syeda Mashal Abbas Zaidi and Muhammad Basit Iqbal Awan and Zartash Afzal Uzmi and Zafar Ayyub Qazi Neutrino: a Fast and Consistent Edge-Based Cellular Control Plane . . . 754--769 Viviana Arrigoni and Novella Bartolini and Annalisa Massini and Federico Trombetti A Bayesian Approach to Network Monitoring for Progressive Failure Localization . . . . . . . . . . . . . . 770--783 Vishrant Tripathi and Rajat Talak and Eytan Modiano Information Freshness in Multihop Wireless Networks . . . . . . . . . . . 784--799 Yu-Han Lu and Sandy Hsin-Yu Hsiao and Chi-Yu Li and Yi-Chen Hsieh and Po-Yi Chou and Yao-Yu Li and Tian Xie and Guan-Hua Tu Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures . . . . . . . . . . . . 800--815 Jielun Zhang and Fuhao Li and Feng Ye Sustaining the High Performance of AI-Based Network Traffic Classification Models . . . . . . . . . . . . . . . . . 816--827 Tianjian Dong and Qi Qi and Jingyu Wang and Zirui Zhuang and Haifeng Sun and Jianxin Liao and Zhu Han Standing on the Shoulders of Giants: Cross-Slice Federated Meta Learning for Resource Orchestration to Cold-Start Slice . . . . . . . . . . . . . . . . . 828--845 Shicheng Wang and Menghao Zhang and Guanyu Li and Chang Liu and Zhiliang Wang and Ying Liu and Mingwei Xu Bolt: Scalable and Cost-Efficient Multistring Pattern Matching With Programmable Switches . . . . . . . . . 846--861 Guangtao Xue and Yijie Li and Hao Pan and Lanqing Yang and Yi-Chao Chen and Xiaoyu Ji and Jiadi Yu ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature . . . . 862--876 Jiawei Li and Chuyu Wang and Ang Li and Dianqi Han and Yan Zhang and Jinhang Zuo and Rui Zhang and Lei Xie and Yanchao Zhang Rhythmic RFID Authentication . . . . . . 877--890 Yang Gao and Hongli Zhang and Xiangzhan Yu Higher-Order Community Detection: On Information Degeneration and Its Elimination . . . . . . . . . . . . . . 891--903 Dezhang Kong and Yi Shen and Xiang Chen and Qiumei Cheng and Hongyan Liu and Dong Zhang and Xuan Liu and Shuangxi Chen and Chunming Wu Combination Attacks and Defenses on SDN Topology Discovery . . . . . . . . . . . 904--919
Wei Yang and Chi Lin and Haipeng Dai and Pengfei Wang and Jiankang Ren and Lei Wang and Guowei Wu and Qiang Zhang Robust Wireless Rechargeable Sensor Networks . . . . . . . . . . . . . . . . 949--964 Xiong Wang and Jiancheng Ye and John C. S. Lui Decentralized Scheduling and Dynamic Pricing for Edge Computing: a Mean Field Game Approach . . . . . . . . . . . . . 965--978 Marco Faltelli and Giacomo Belocchi and Francesco Quaglia and Salvatore Pontarelli and Giuseppe Bianchi Metronome: Adaptive and Precise Intermittent Packet Retrieval in DPDK 979--993 Haoxian Chen and Chenyuan Wu and Andrew Zhao and Mukund Raghothaman and Mayur Naik and Boon Thau Loo Synthesizing Formal Network Specifications From Input--Output Examples . . . . . . . . . . . . . . . . 994--1009 Yang Du and He Huang and Yu-E Sun and Shigang Chen and Guoju Gao and Xiaocan Wu Self-Adaptive Sampling Based Per-Flow Traffic Measurement . . . . . . . . . . 1010--1025 Feng Lin and Ming Gao and Lingfeng Zhang and Yimin Li and Weiye Xu and Jinsong Han and Xian Xu and Wenyao Xu and Kui Ren Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound . . . . . . . . . . . . . . . 1026--1041 Kan Yu and Jiguo Yu and Chuanwen Luo The Impact of Mobility on Physical Layer Security of 5G IoT Networks . . . . . . 1042--1055 Min Yee Teh and Shizhen Zhao and Peirui Cao and Keren Bergman Enabling Quasi-Static Reconfigurable Networks With Robust Topology Engineering . . . . . . . . . . . . . . 1056--1070 Yipeng Wang and Huijie He and Yingxu Lai and Alex X. Liu A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic . . . . . . . . . . . . . . . . 1071--1086 Karim Elsayed and Amr Rizk Time-to-Live Caching With Network Delays: Exact Analysis and Computable Approximations . . . . . . . . . . . . . 1087--1100 Xiaofeng Lu and Fan Yang and Luwen Zou and Pietro Lio and Pan Hui An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key . . . . . . . . . . . . . . . 1101--1116 Jianwei Liu and Kaiyan Cui and Xiang Zou and Jinsong Han and Feng Lin and Kui Ren Reliable Multi-Factor User Authentication With One Single Finger Swipe . . . . . . . . . . . . . . . . . 1117--1131 Longzhi Yuan and Qiwei Wang and Jia Zhao and Wei Gong Multiprotocol Backscatter With Commodity Radios for Personal IoT Sensors . . . . 1132--1144 Jingling Liu and Jiawei Huang and Weihe Li and Jianxin Wang and Tian He Asymmetry-Aware Load Balancing With Adaptive Switching Granularity in Data Center . . . . . . . . . . . . . . . . . 1145--1158 Ningning Hou and Xianjin Xia and Yuanqing Zheng CloakLoRa: a Covert Channel Over LoRa PHY . . . . . . . . . . . . . . . . . . 1159--1172 Tareq Si Salem and Giovanni Neglia and Damiano Carra Ascent Similarity Caching With Approximate Indexes . . . . . . . . . . 1173--1186 Vishwaraj Doshi and Shailaja Mallick and Do Young Eun Convergence of Bi-Virus Epidemic Models With Non-Linear Rates on Networks --- a Monotone Dynamical Systems Approach . . 1187--1201 Junnyung Hur and Hyeon Gy Shon and Young Jae Kim and Myungkeun Yoon Packet Chunking for File Detection . . . 1202--1215 Wenzheng Xu and Hongbin Xie and Chenxi Wang and Weifa Liang and Xiaohua Jia and Zichuan Xu and Pan Zhou and Weigang Wu and Xiang Chen An Approximation Algorithm for the h-Hop Independently Submodular Maximization Problem and Its Applications . . . . . . 1216--1229 Alon Rashelbach and Ori Rottenstreich and Mark Silberstein Scaling by Learning: Accelerating Open vSwitch Data Path With Neural Networks 1230--1243 Erfan Meskar and Ben Liang Fair Multi-Resource Allocation in Heterogeneous Servers With an External Resource Type . . . . . . . . . . . . . 1244--1262 Anders E. Kalòr and Petar Popovski Timely Monitoring of Dynamic Sources With Observations From Multiple Wireless Sensors . . . . . . . . . . . . . . . . 1263--1276 Berksan Serbetci and Eleftherios Lampiris and Thrasyvoulos Spyropoulos and Giuseppe Caire and Petros Elia Multi-Transmitter Coded Caching Networks With Transmitter-Side Knowledge of File Popularity . . . . . . . . . . . . . . . 1277--1292 Matteo Salani and Cristina Rottondi and Leopoldo Ceré and Massimo Tornatore Dual-Stage Planning for Elastic Optical Networks Integrating Machine-Learning-Assisted QoT Estimation 1293--1307 Shuqin Gao and Costas A. Courcoubetis and Lingjie Duan Distributed Double Auction Mechanisms for Large-Scale Device-to-Device Resource Trading . . . . . . . . . . . . 1308--1323 Pietro Bressana and Noa Zilberman and Robert Soulé PTA: Finding Hard-to-Find Data Plane Bugs . . . . . . . . . . . . . . . . . . 1324--1337 Noor Felemban and Fidan Mehmeti and Thomas F. La Porta VidQ: Video Query Using Optimized Audio-Visual Processing . . . . . . . . 1338--1352 Haodi Ping and Yongcai Wang and Deying Li and Wenping Chen Understanding Node Localizability in Barycentric Linear Localization . . . . 1353--1368 Peng Lin and Kejiang Ye and Yishen Hu and Yanying Lin and Cheng-Zhong Xu A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification . . . . . . . . . . . . . 1369--1384 Wenhao Li and Xiao-Yu Zhang and Huaifeng Bao and Haichao Shi and Qiang Wang ProGraph: Robust Network Traffic Identification With Graph Propagation 1385--1399
Minghao Ye and Junjie Zhang and Zehua Guo and H. Jonathan Chao FlexDATE: Flexible and Disturbance-Aware Traffic Engineering With Reinforcement Learning in Software-Defined Networks 1433--1448 Yongmin Zhang and Wei Wang and Ju Ren and Jinge Huang and Shibo He and Yaoxue Zhang Efficient Revenue-Based MEC Server Deployment and Management in Mobile Edge-Cloud Computing . . . . . . . . . . 1449--1462 Xu Lin and Deke Guo and Yulong Shen and Guoming Tang and Bangbang Ren and Ming Xu SFT-Box: an Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs . . . . . . . . . . 1463--1477 Songtao Fu and Qi Li and Min Zhu and Xiaoliang Wang and Su Yao and Yangfei Guo and Xinle Du and Ke Xu MASK: Practical Source and Path Verification Based on Multi-AS-Key . . . 1478--1493 Junchao Ma and Lingjia Liu and Bodong Shang and Shashank Jere and Pingzhi Fan Performance Analysis and Optimization for Layer-Based Scalable Video Caching in 6G Networks . . . . . . . . . . . . . 1494--1506 Jian Su and Zhengguo Sheng and Chenxi Huang and Gang Li and Alex X. Liu and Zhangjie Fu Identifying RFID Tags in Collisions . . 1507--1520 Guy Goren and Shay Vargaftik and Yoram Moses Distributed Dispatching in the Parallel Server Model . . . . . . . . . . . . . . 1521--1534 Qi Shi and Dong Hao Social Sourcing: Incorporating Social Networks Into Crowdsourcing Contest Design . . . . . . . . . . . . . . . . . 1535--1549 Na Wang and Junsong Fu and Shancheng Zhang and Zheng Zhang and Jiawen Qiao and Jianwei Liu and Bharat K. Bhargava Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain . . . . . . . . 1550--1565 Jianer Zhou and Xinyi Qiu and Zhenyu Li and Qing Li and Gareth Tyson and Jingpu Duan and Yi Wang and Heng Pan and Qinghua Wu A Machine Learning-Based Framework for Dynamic Selection of Congestion Control Algorithms . . . . . . . . . . . . . . . 1566--1581 Shiva Raj Pokhrel and Jinho Choi and Anwar Walid Fair and Efficient Distributed Edge Learning With Hybrid Multipath TCP . . . 1582--1594 Juhyeng Han and Insu Yun and Seongmin Kim and Taesoo Kim and Sooel Son and Dongsu Han Scalable and Secure Virtualization of HSM With ScaleTrust . . . . . . . . . . 1595--1610 Xia Cheng and Junyang Shi and Mo Sha and Linke Guo Revealing Smart Selective Jamming Attacks in WirelessHART Networks . . . . 1611--1625 Tim Hellemans and Grzegorz Kielanski and Benny Van Houdt Performance of Load Balancers With Bounded Maximum Queue Length in Case of Non-Exponential Job Sizes . . . . . . . 1626--1641 Steffen Lindner and Gabriel Paradzik and Michael Menth Alternative Best Effort (ABE) for Service Differentiation: Trading Loss Versus Delay . . . . . . . . . . . . . . 1642--1656 Chi Lin and Shibo Hao and Wei Yang and Pengfei Wang and Lei Wang and Guowei Wu and Qiang Zhang Maximizing Energy Efficiency of Period-Area Coverage With a UAV for Wireless Rechargeable Sensor Networks 1657--1673 Dheeraj Narasimha and Srinivas Shakkottai and Lei Ying Age-Dependent Distributed MAC for Ultra-Dense Wireless Networks . . . . . 1674--1687 Christos Tsanikidis and Javad Ghaderi Randomized Scheduling of Real-Time Traffic in Wireless Networks Over Fading Channels . . . . . . . . . . . . . . . . 1688--1701 Francesco Malandrino and Carla Fabiana Chiasserini and Giuseppe di Giacomo Efficient Distributed DNNs in the Mobile-Edge-Cloud Continuum . . . . . . 1702--1716 Xiang Chen and Hongyan Liu and Dong Zhang and Qun Huang and Haifeng Zhou and Chunming Wu and Qiang Yang Eliminating Control Plane Overload via Measurement Task Placement . . . . . . . 1717--1731 Kaihui Gao and Chen Sun and Shuai Wang and Dan Li and Yu Zhou and Hongqiang Harry Liu and Lingjun Zhu and Ming Zhang and Xiang Deng and Cheng Zhou and Lu Lu Buffer-Based High-Coverage and Low-Overhead Request Event Monitoring in the Cloud . . . . . . . . . . . . . . . 1732--1747 Kaihui Gao and Shuai Wang and Kun Qian and Dan Li and Rui Miao and Bo Li and Yu Zhou and Ennan Zhai and Chen Sun and Jiaqi Gao and Dai Zhang and Binzhang Fu and Frank Kelly and Dennis Cai and Hongqiang Harry Liu and Yan Li and Hongwei Yang and Tao Sun Dependable Virtualized Fabric on Programmable Data Plane . . . . . . . . 1748--1764 Zheng Yang and Xu Wang and Jiahang Wu and Yi Zhao and Qiang Ma and Xin Miao and Li Zhang and Zimu Zhou EdgeDuet: Tiling Small Object Detection for Edge Assisted Autonomous Mobile Vision . . . . . . . . . . . . . . . . . 1765--1778 Cho-Hsin Tsai and Chih-Chun Wang Distribution-Oblivious Online Algorithms for Age-of-Information Penalty Minimization . . . . . . . . . . . . . . 1779--1794 Meng Jin and Xinbing Wang and Chenghu Zhou Key Agreement on IoT Devices With Echo Profiling . . . . . . . . . . . . . . . 1795--1808 Bai Liu and Qingkai Liang and Eytan Modiano Tracking MaxWeight: Optimal Control for Partially Observable and Controllable Networks . . . . . . . . . . . . . . . . 1809--1821 Apoorv Shukla and Kevin Hudemann and Zsolt Vági and Lily Hügerich and Georgios Smaragdakis and Artur Hecker and Stefan Schmid and Anja Feldmann Runtime Verification for Programmable Switches . . . . . . . . . . . . . . . . 1822--1837 Youngmok Ha and Eunji Pak and Jongkil Park and Taeho Kim and Ji Won Yoon Clock Offset Estimation for Systems With Asymmetric Packet Delays . . . . . . . . 1838--1853 Qilong Shi and Yuchen Xu and Jiuhua Qi and Wenjun Li and Tong Yang and Yang Xu and Yi Wang Cuckoo Counter: Adaptive Structure of Counters for Accurate Frequency and Top-$k$ Estimation . . . . . . . . . . . 1854--1869 Bingnan Hou and Zhiping Cai and Kui Wu and Tao Yang and Tongqing Zhou 6Scan: a High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding . . . . . . . . . . . . . . . . 1870--1885
Qingjun Xiao and Xuyuan Cai and Yifei Qin and Zhiying Tang and Shigang Chen and Yu Liu Universal and Accurate Sketch for Estimating Heavy Hitters and Moments in Data Streams . . . . . . . . . . . . . . 1919--1934 Daron Anderson and George Iosifidis and Douglas J. Leith Lazy Lagrangians for Optimistic Learning With Budget Constraints . . . . . . . . 1935--1949 Shangyao Yan and Zhimeng Yin and Guang Tan CurveLight: an Accurate and Practical Light Positioning System . . . . . . . . 1950--1964 Zehua Guo and Songshi Dou and Wenfei Wu and Yuanqing Xia Toward Flexible and Predictable Path Programmability Recovery Under Multiple Controller Failures in Software-Defined WANs . . . . . . . . . . . . . . . . . . 1965--1980 Tinghao Zhang and Kwok-Yan Lam and Jun Zhao and Feng Li and Huimei Han and Norziana Jamil Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection . . . . . . . . . . . . 1981--1996 Xinzhe Fu and Eytan Modiano Optimal Routing to Parallel Servers With Unknown Utilities --- Multi--Armed Bandit With Queues . . . . . . . . . . . 1997--2012 Suhan Jiang and Jie Wu Approaching an Optimal Bitcoin Mining Overlay . . . . . . . . . . . . . . . . 2013--2026 Jincheng Zhong and Ziling Wei and Shuang Zhao and Shuhui Chen TupleTree: a High-Performance Packet Classification Algorithm Supporting Fast Rule-Set Updates . . . . . . . . . . . . 2027--2041 Rui Xia and Haipeng Dai and Jiaqi Zheng and Rong Gu and Xiaoyu Wang and Weijun Wang and Guihai Chen SAFE: Service Availability via Failure Elimination Through VNF Scaling . . . . 2042--2057 Tianyou Qiu and Yiping Li and Xisheng Feng Optimal Broadcast Scheduling Algorithm for a Multi-AUV Acoustic Communication Network . . . . . . . . . . . . . . . . 2058--2069 Qian Chen and Jiliang Wang AlignTrack: Push the SNR Limit of LoRa Collision Decoding . . . . . . . . . . . 2070--2085 Rajeev Sahay and Serena Nicoll and Minjun Zhang and Tsung-Yen Yang and Carlee Joe-Wong and Kerrie A. Douglas and Christopher G. Brinton Predicting Learning Interactions in Social Learning Networks: a Deep Learning Enabled Approach . . . . . . . 2086--2100 Kun Xie and Yudian Ouyang and Xin Wang and Gaogang Xie and Kenli Li and Wei Liang and Jiannong Cao and Jigang Wen Deep Adversarial Tensor Completion for Accurate Network Traffic Measurement . . 2101--2116 Hao Kong and Li Lu and Jiadi Yu and Yingying Chen and Xiangyu Xu and Feng Lyu Toward Multi-User Authentication Using WiFi Signals . . . . . . . . . . . . . . 2117--2132 Keerthi Priya Dasala and Josep Miquel Jornet and Edward W. Knightly Scaling Multi-User mmWave WLANs: The Case for Concurrent Uplink Transmissions on a Single RF Chain . . . . . . . . . . 2133--2146 Guojun Xiong and Shufan Wang and Gang Yan and Jian Li Reinforcement Learning for Dynamic Dimensioning of Cloud Caches: a Restless Bandit Approach . . . . . . . . . . . . 2147--2161 Jia Zhang and Shaorui Ren and Enhuan Dong and Zili Meng and Yuan Yang and Mingwei Xu and Sijie Yang and Miao Zhang and Yang Yue Reducing Mobile Web Latency Through Adaptively Selecting Transport Protocol 2162--2177 Bahman Abolhassani and John Tadrous and Atilla Eryilmaz Optimal Load-Splitting and Distributed-Caching for Dynamic Content Over the Wireless Edge . . . . . . . . . 2178--2190 Andrea Baiocchi and Ion Turcanu On Flow Control and Optimized Back-Off in Non-Saturated CSMA . . . . . . . . . 2191--2206 Yijing Zeng and Roberto Calvo-Palomino and Domenico Giustiniano and Gerome Bovet and Suman Banerjee Adaptive Uplink Data Compression in Spectrum Crowdsensing Systems . . . . . 2207--2221 Renpeng Zou and Xixiang Lyu and Jing Ma and Bowen Zhang and Danfang Wu BCMIX: a Blockchain-Based Dynamic Self-Reconfigurable Mixnet . . . . . . . 2222--2235 Yuanyuan Li and Yuezhou Liu and Lili Su and Edmund Yeh and Stratis Ioannidis Experimental Design Networks: a Paradigm for Serving Heterogeneous Learners Under Networking Constraints . . . . . . . . . 2236--2250 Sarath Yasodharan and Anurag Kumar Revenue Optimal Bandwidth Allocation in a Class of Multihop Networks: Algorithms and Asymptotic Optimality . . . . . . . 2251--2266 Jin Fang and Gongming Zhao and Hongli Xu and Changbo Wu and Zhuolong Yu GRID: Gradient Routing With In-Network Aggregation for Distributed Training . . 2267--2280 Md Shahbaz Akhtar and Krishnakumar G. and Vishnu B. and Abhishek Sinha Fast and Secure Routing Algorithms for Quantum Key Distribution Networks . . . 2281--2296 Yitao Xing and Kaiping Xue and Yuan Zhang and Jiangping Han and Jian Li and David S. L. WeiMember An Online Learning Assisted Packet Scheduler for MPTCP in Mobile Networks 2297--2312 Yibo Jin and Lei Jiao and Mingtao Ji and Zhuzhong Qian and Sheng Zhang and Ning Chen and Sanglu Lu Scheduling In-Band Network Telemetry With Convergence-Preserving Federated Learning . . . . . . . . . . . . . . . . 2313--2328 Pengtao Fu and Lailong Luo and Deke Guo and Shangsen Li and Yun Zhou A Shifting Filter Framework for Dynamic Set Queries . . . . . . . . . . . . . . 2329--2344 Riheng Jia and Jinhao Wu and Xiong Wang and Jianfeng Lu and Feilong Lin and Zhonglong Zheng and Minglu Li Energy Cost Minimization in Wireless Rechargeable Sensor Networks . . . . . . 2345--2360 Yiran Zhang and Qingkai Meng and Yifan Liu and Fengyuan Ren Revisiting Congestion Detection in Lossless Networks . . . . . . . . . . . 2361--2375
Han Zhang and Xia Yin and Xingang Shi and Jilong Wang and Zhiliang Wang and Yingya Guo and Tian Lan and Yahui Li and Yongqing Zhu and Ke Ruan and Haijun Geng Achieving High Availability in Inter-DC WAN Traffic Engineering . . . . . . . . 2406--2421 Yuntao Wang and Zhou Su and Qichao Xu and Ruidong Li and Tom H. Luan and Pinghui Wang A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue 2422--2438 Hong Xie and John C. S. Lui Cooperation Preference Aware Shapley Value: Modeling, Algorithms and Applications . . . . . . . . . . . . . . 2439--2453 Congkai An and Anfu Zhou and Jialiang Pei and Xi Liu and Dongzhu Xu and Liang Liu and Huadong Ma Octopus: Exploiting the Edge Intelligence for Accessible 5G Mobile Performance Enhancement . . . . . . . . 2454--2469 Sara Garcia Sanchez and Guillem Reus-Muns and Carlos Bocanegra and Yanyu Li and Ufuk Muncuk and Yousof Naderi and Yanzhi Wang and Stratis Ioannidis and Kaushik Roy Chowdhury AirNN: Over-the-Air Computation for Neural Networks via Reconfigurable Intelligent Surfaces . . . . . . . . . . 2470--2482 Kiril Danilchenko and Zeev Nutov and Michael Segal Covering Users With QoS by a Connected Swarm of Drones: Graph Theoretical Approach and Experiments . . . . . . . . 2483--2498 Won Joon Yun and Yunseok Kwak and Hankyul Baek and Soyi Jung and Mingyue Ji and Mehdi Bennis and Jihong Park and Joongheon Kim SlimFL: Federated Learning With Superposition Coding Over Slimmable Neural Networks . . . . . . . . . . . . 2499--2514 Guocheng Liao and Xu Chen and Jianwei Huang Privacy Protection Under Incomplete Social and Data Correlation Information 2515--2528 Qian Lv and Zuqing Zhu On the Multilayer Planning of Filterless Optical Networks With OTN Encryption . . 2529--2544 Wei Wang and Xin Liu and Yao Yao and Zicheng Chi and Stuart Ray and Ting Zhu and Yanchao Zhang Simultaneous Data Dissemination Among WiFi and ZigBee Devices . . . . . . . . 2545--2558 Zeqi Lai and Hewu Li and Qi Zhang and Qian Wu and Jianping Wu StarFront: Cooperatively Constructing Pervasive and Low-Latency CDNs Upon Emerging LEO Satellites and Clouds . . . 2559--2574 Songshi Dou and Li Qi and Chao Yao and Zehua Guo Exploring the Impact of Critical Programmability on Controller Placement for Software-Defined Wide Area Networks 2575--2588 Yevheniya Nosyk and Maciej Korczy\'nski and Qasim Lone and Marcin Skwarek and Baptiste Jonglez and Andrzej Duda The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation . . . . . . . . . . . . . . . 2589--2603 Yongquan Fu and Lun An and Siqi Shen and Kai Chen and Pere Barlet-Ros A One-Pass Clustering Based Sketch Method for Network Monitoring . . . . . 2604--2613 Ahmed M. Abdelmoniem and Brahim Bensaou Enhancing TCP via Hysteresis Switching: Theoretical Analysis and Empirical Evaluation . . . . . . . . . . . . . . . 2614--2623 Fusheng Lin and Hongyu Wang and Guo Chen and Guihua Zhou and Tingting Xu and Dehui Wei and Li Chen and Yuanwei Lu and Andrew Qu and Hua Shao and Hongbo Jiang Fast, Scalable and Robust Centralized Routing for Data Center Networks . . . . 2624--2639 Xuezheng Liu and Zirui Yan and Yipeng Zhou and Di Wu and Xu Chen and Jessie Hui Wang Optimizing Parameter Mixing Under Constrained Communications in Parallel Federated Learning . . . . . . . . . . . 2640--2652 Ruijie Miao and Yinda Zhang and Zihao Zheng and Ruixin Wang and Ruwen Zhang and Tong Yang and Zaoxing Liu and Junchen Jiang CocoSketch: High-Performance Sketch-Based Measurement Over Arbitrary Partial Key Query . . . . . . . . . . . 2653--2668 Kanatip Chitavisutthivong and Sucha Supittayapornpong and Pooria Namyar and Mingyang Zhang and Minlan Yu and Ramesh Govindan Optimal Oblivious Routing With Concave Objectives for Structured Networks . . . 2669--2681 Bhargav Ganguly and Seyyedali Hosseinalipour and Kwang Taik Kim and Christopher G. Brinton and Vaneet Aggarwal and David J. Love and Mung Chiang Multi-Edge Server-Assisted Dynamic Federated Learning With an Optimized Floating Aggregation Point . . . . . . . 2682--2697 Jiaxiao Zheng and Albert Banchs and Gustavo de Veciana Constrained Network Slicing Games: Achieving Service Guarantees and Network Efficiency . . . . . . . . . . . . . . . 2698--2713 Qi Shao and Man Hon Cheung and Jianwei Huang Crowdfunding With Cognitive Limitations 2714--2729 Chen Wang and Qin Hu and Dongxiao Yu and Xiuzhen Cheng Online Learning for Failure-Aware Edge Backup of Service Function Chains With the Minimum Latency . . . . . . . . . . 2730--2744 Dian Shen and Junzhou Luo and Fang Dong and Xiaolin Guo and Ciyuan Chen and Kai Wang and John C. S. Lui Enabling Distributed and Optimal RDMA Resource Sharing in Large-Scale Data Center Networks: Modeling, Analysis, and Implementation . . . . . . . . . . . . . 2745--2760 Linh T. Hoang and Chuyen T. Nguyen and Anh T. Pham Deep Reinforcement Learning-Based Online Resource Management for UAV-Assisted Edge Computing With Dual Connectivity 2761--2776 Yangming Zhao and Chunming Qiao Distributed Transport Protocols for Quantum Data Networks . . . . . . . . . 2777--2792 Ruixuan Li and Xiaofeng Jia and Zhenyong Zhang and Jun Shao and Rongxing Lu and Jingqiang Lin and Xiaoqi Jia and Guiyi Wei A Longitudinal and Comprehensive Measurement of DNS Strict Privacy . . . 2793--2808 Dong Yang and Zongrong Cheng and Weiting Zhang and Hongke Zhang and Xuemin Shen Burst-Aware Time-Triggered Flow Scheduling With Enhanced Multi-CQF in Time-Sensitive Networks . . . . . . . . 2809--2824 Lailong Luo and Pengtao Fu and Shangsen Li and Deke Guo and Qianzhen Zhang and Huaimin Wang Ark Filter: a General and Space-Efficient Sketch for Network Flow Analysis . . . . . . . . . . . . . . . . 2825--2839 Xiuqi Huang and Yuanning Gao and Xinyi Zhou and Xiaofeng Gao and Guihai Chen An Adaptive Metadata Management Scheme Based on Deep Reinforcement Learning for Large-Scale Distributed File Systems . . 2840--2853
Junseon Kim and Youngbin Im and Kyunghan Lee Enabling Delay-Guaranteed Congestion Control With One-Bit Feedback in Cellular Networks . . . . . . . . . . . 3--16 Aakash Khochare and Francesco Betti Sorbelli and Yogesh Simmhan and Sajal K. Das Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet Missions . . . . . . . . . . . . . . . . 17--33 Danfeng Shan and Linbing Jiang and Peng Zhang and Wanchun Jiang and Hao Li and Yazhe Tang and Fengyuan Ren Enforcing Fairness in the Traffic Policer Among Heterogeneous Congestion Control Algorithms . . . . . . . . . . . 34--49 Yali Yuan and Weijun Wang and Yuhan Wang and Sripriya Srikant Adhatarao and Bangbang Ren and Kai Zheng and Xiaoming Fu Joint Optimization of QoE and Fairness for Adaptive Video Streaming in Heterogeneous Mobile Environments . . . 50--64 Qiang He and Zheng Feng and Hui Fang and Xingwei Wang and Liang Zhao and Yudong Yao and Keping Yu A Blockchain-Based Scheme for Secure Data Offloading in Healthcare With Deep Reinforcement Learning . . . . . . . . . 65--80 Fabrício B. Carvalho and Ronaldo A. Ferreira and Ítalo Cunha and Marcos A. M. Vieira and Murali K. Ramanathan State Disaggregation for Dynamic Scaling of Network Functions . . . . . . . . . . 81--95 Yizong Wang and Dong Zhao and Chenghao Huang and Fuyu Yang and Teng Gao and Anfu Zhou and Huanhuan Zhang and Huadong Ma and Yang Du and Aiyun Chen TrafAda: Cost-Aware Traffic Adaptation for Maximizing Bitrates in Live Streaming . . . . . . . . . . . . . . . 96--109 Gongming Zhao and Jingzhou Wang and Hongli Xu and Yangming Zhao and Xuwei Yang and He Huang Joint Request Updating and Elastic Resource Provisioning With QoS Guarantee in Clouds . . . . . . . . . . . . . . . 110--126 Wanchun Jiang and Haoyang Li and Jia Wu and Zheyuan Liu and Jiawei Huang and Danfeng Shan and Jianxin Wang Improvement of Copa: Behaviors and Friendliness of Delay-Based Congestion Control Algorithm . . . . . . . . . . . 127--142 Zehua Guo and Songshi Dou and Wenchao Jiang and Yuanqing Xia Toward Improved Path Programmability Recovery for Software-Defined WANs Under Multiple Controller Failures . . . . . . 143--158 Xiaoli Zhang and Wei Geng and Yiqiao Song and Hongbing Cheng and Ke Xu and Qi Li Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds . . . . . . . . . . . . . . . 159--174 Yong Deng and Min Dong Decentralized Caching Under Nonuniform File Popularity and Size: Memory-Rate Tradeoff Characterization . . . . . . . 175--190 Xiang Chen and Hongyan Liu and Qun Huang and Dong Zhang and Haifeng Zhou and Chunming Wu and Xuan Liu Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions . . . . . . . . . . . . . . . 191--206 Meng Jin and Yuan He and Yunhao Liu and Xinbing Wang Covert Communication With Acoustic Noise 207--221 Seyyedali Hosseinalipour and Su Wang and Nicol\`o Michelusi and Vaneet Aggarwal and Christopher G. Brinton and David J. Love and Mung Chiang Parallel Successive Learning for Dynamic Distributed Model Training Over Heterogeneous Wireless Networks . . . . 222--237 Kan Yu and Jiguo Yu and Zhiyong Feng and Honglong Chen A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling . . . . . . . . . . . . . . . 238--252 Masahito Hayashi and Takeshi Koshiba Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage . . . . . . . . 253--267 Gongming Zhao and Jingzhou Wang and Yangming Zhao and Hongli Xu and Liusheng Huang and Chunming Qiao Segmented Entanglement Establishment With All-Optical Switching in Quantum Networks . . . . . . . . . . . . . . . . 268--282 Christoph Lenzen and Moti Medina and Mehrdad Saberi and Stefan Schmid Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults . . . 283--297 Masaki Murakami and Takashi Kurimoto and Satoru Okamoto and Naoaki Yamanaka Experimental Evaluation on Priority-Aware Guaranteed Resource Allocation for Resource Pool Based Reconfigurable Hardware . . . . . . . . 298--307 Marc Carrascosa-Zamacois and Giovanni Geraci and Edward Knightly and Boris Bellalta Wi-Fi Multi-Link Operation: an Experimental Study of Latency and Throughput . . . . . . . . . . . . . . . 308--322 Weiguang Zhang and Jiarong Liang and Xinyu Liang Approximation Algorithms for Computing Virtual Backbones Considering Routing Costs in Wireless Networks . . . . . . . 323--337 Xin Liu and Zicheng Chi and Wei Wang and Yao Yao and Pei Hao and Ting Zhu High-Granularity Modulation for OFDM Backscatter . . . . . . . . . . . . . . 338--351 Yiming Zeng and Jiarui Zhang and Ji Liu and Zhenhua Liu and Yuanyuan Yang Entanglement Routing Design Over Quantum Networks . . . . . . . . . . . . . . . . 352--367 Lutong Chen and Kaiping Xue and Jian Li and Ruidong Li and Nenghai Yu and Qibin Sun and Jun Lu Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks . . . . . . . . . . . . . . . . 368--381 Guorui Xie and Qing Li and Guanglin Duan and Jiaye Lin and Yutao Dong and Yong Jiang and Dan Zhao and Yuan Yang Empowering In-Network Classification in Programmable Switches by Binary Decision Tree and Knowledge Distillation . . . . 382--395 Mingxin Cai and Yutong Liu and Linghe Kong and Guihai Chen and Liang Liu and Meikang Qiu and Shahid Mumtaz Resource Critical Flow Monitoring in Software-Defined Networks . . . . . . . 396--410 Liyuan Gu and Ye Tian and Wei Chen and Zhongxiang Wei and Cenman Wang and Xinming Zhang Per-Flow Network Measurement With Distributed Sketch . . . . . . . . . . . 411--426 Fengyuan Zhu and Renjie Zhao and Bingbing Wang and Xinbing Wang and Xinping Guan and Chenghu Zhou and Xiaohua Tian Enabling OFDMA in Wi-Fi Backscatter . . 427--444 Ning Chen and Sheng Zhang and Zhi Ma and Yu Chen and Yibo Jin and Jie Wu and Zhuzhong Qian and Yu Liang and Sanglu Lu ViChaser: Chase Your Viewpoint for Live Video Streaming With Block-Oriented Super-Resolution . . . . . . . . . . . . 445--459 Qinhan Wei and Yongcai Wang and Deying Li EMI: an Efficient Algorithm for Identifying Maximal Rigid Clusters in $3$D Generic Graphs . . . . . . . . . . 460--474 Payam Abdisarabshali and Minghui Liwang and Amir Rajabzadeh and Mahmood Ahmadi and Seyyedali Hosseinalipour Decomposition Theory Meets Reliability Analysis: Processing of Computation-Intensive Dependent Tasks Over Vehicular Clouds With Dynamic Resources . . . . . . . . . . . . . . . 475--490 Xiong Wang and Jiancheng Ye and John C. S. Lui Mean Field Graph Based D$2$D Collaboration and Offloading Pricing in Mobile Edge Computing . . . . . . . . . 491--505 Zhengyu Liao and Shiyou Qian and Zhonglong Zheng and Jiange Zhang and Jian Cao and Guangtao Xue and Minglu Li PT-Tree: a Cascading Prefix Tuple Tree for Packet Classification in Dynamic Scenarios . . . . . . . . . . . . . . . 506--519 Jiaqi Zheng and Zhuoxuan Du and Zhenqing Zha and Zixuan Yang and Xiaofeng Gao and Guihai Chen Learning to Configure Converters in Hybrid Switching Data Center Networks 520--534 Xiaohua Tian and Fengyuan Zhu and Hao Li and Mingwei Ouyang and Luwei Feng and Xinyu Tong and Xinbing Wang MobiScatter: Enhancing Capacity in Drone-Assisted High-Concurrency Backscatter Networks . . . . . . . . . . 535--549 Liekang Zeng and Xu Chen and Peng Huang and Ke Luo and Xiaoxi Zhang and Zhi Zhou Serving Graph Neural Networks With Distributed Fog Servers for Smart IoT Services . . . . . . . . . . . . . . . . 550--565 Hao Wang and Chi Harold Liu and Haoming Yang and Guoren Wang and Kin K. Leung Ensuring Threshold AoI for UAV-Assisted Mobile Crowdsensing by Multi-Agent Deep Reinforcement Learning With Transformer 566--581 Jianpeng Qi and Xiao Su and Rui Wang Toward Distributively Build Time-Sensitive-Service Coverage in Compute First Networking . . . . . . . . 582--597 Damien Guidolin-Pina and Marc Boyer and Jean-Yves Le Boudec Configuration of Guard Band and Offsets in Cyclic Queuing and Forwarding . . . . 598--612 Xiaohan Zhang and Jinwen Wang and Yueqiang Cheng and Qi Li and Kun Sun and Yao Zheng and Ning Zhang and Xinghua Li Interface-Based Side Channel in TEE-Assisted Networked Services . . . . 613--626 Junxue Zhang and Chaoliang Zeng and Hong Zhang and Shuihai Hu and Kai Chen LiteFlow: Toward High-Performance Adaptive Neural Networks for Kernel Datapath . . . . . . . . . . . . . . . . 627--642 Bhargav Ganguly and Vaneet Aggarwal Online Federated Learning via Non-Stationary Detection and Adaptation Amidst Concept Drift . . . . . . . . . . 643--653 Daniel Ayepah-Mensah and Guolin Sun and Gordon Owusu Boateng and Stephen Anokye and Guisong Liu Blockchain-Enabled Federated Learning-Based Resource Allocation and Trading for Network Slicing in 5G . . . 654--669 Si Wu and Zhirong Shen and Patrick P. C. Lee and Zhiwei Bai and Yinlong Xu Elastic Reed--Solomon Codes for Efficient Redundancy Transitioning in Distributed Key--Value Stores . . . . . 670--685 Tomer Voronov and Danny Raz and Ori Rottenstreich A Framework for Anomaly Detection in Blockchain Networks With Sketches . . . 686--698 Zihao Wang and Hang Wang and Zhuowen Li and Xinghua Li and Yinbin Miao and Yanbing Ren and Yunwei Wang and Zhe Ren and Robert H. Deng Robust Permissioned Blockchain Consensus for Unstable Communication in FANET . . 699--712 Liekang Zeng and Haowei Chen and Daipeng Feng and Xiaoxi Zhang and Xu Chen A$3$D: Adaptive, Accurate, and Autonomous Navigation for Edge-Assisted Drones . . . . . . . . . . . . . . . . . 713--728 Bin Luo and Xinghua Li and Yinbin Miao and Man Zhang and Ximeng Liu and Yanbing Ren and Xizhao Luo and Robert H. Deng PAM$^3$S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS . . . . . 729--744 Miao Dai and Gang Sun and Hongfang Yu and Dusit Niyato Maximize the Long-Term Average Revenue of Network Slice Provider via Admission Control Among Heterogeneous Slices . . . 745--760 Peyman Teymoori and Michael Welzl and David A. Hayes LGCC: a Novel High-Throughput and Low Delay Paradigm Shift in Multi-Hop Congestion Control . . . . . . . . . . . 761--776 Fulong Yan and Xiong Deng and Changshun Yuan and Boyuan Yan and Chongjin Xie On the Performance Investigation of a Recursive Fast Optical Switch-Based High Performance Computing Network Architecture . . . . . . . . . . . . . . 777--790 Jianchun Liu and Qingmin Zeng and Hongli Xu and Yang Xu and Zhiyuan Wang and He Huang Adaptive Block-Wise Regularization and Knowledge Distillation for Enhancing Federated Learning . . . . . . . . . . . 791--805 Quan Chen and Song Guo and Zhipeng Cai and Jing Li and Tuo Shi and Hong Gao Peak AoI Minimization at Wireless-Powered Network Edge: From the Perspective of Both Charging and Transmitting . . . . . . . . . . . . . . 806--821 Yuntian Zhang and Ning Han and Tengteng Zhu and Junjie Zhang and Minghao Ye and Songshi Dou and Zehua Guo Prophet: Traffic Engineering-Centric Traffic Matrix Prediction . . . . . . . 822--832 Truc Nguyen and My T. Thai Preserving Privacy and Security in Federated Learning . . . . . . . . . . . 833--843 Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen Revisiting Nakamoto Consensus in Asynchronous Networks: a Comprehensive Analysis of Bitcoin Safety and Chain Quality . . . . . . . . . . . . . . . . 844--858 Tareq Si Salem and Gabriele Castellano and Giovanni Neglia and Fabio Pianese and Andrea Araldo Toward Inference Delivery Networks: Distributing Machine Learning With Optimality Guarantees . . . . . . . . . 859--873 Guijuan Wang and Jiguo Yu and Yifei Zou and Jianxi Fan and Wei Cheng A New Measure of Fault-Tolerance for Network Reliability: Double-Structure Connectivity . . . . . . . . . . . . . . 874--889 Wenzheng Xu and Chengxi Wang and Hongbin Xie and Weifa Liang and Haipeng Dai and Zichuan Xu and Ziming Wang and Bing Guo and Sajal K. Das Reward Maximization for Disaster Zone Monitoring With Heterogeneous UAVs . . . 890--903 Yunming Liao and Yang Xu and Hongli Xu and Zhiwei Yao and Lun Wang and Chunming Qiao Accelerating Federated Learning With Data and Model Parallelism in Edge Computing . . . . . . . . . . . . . . . 904--918
Onur Ayan and Sandra Hirche and Anthony Ephremides and Wolfgang Kellerer Optimal Finite Horizon Scheduling of Wireless Networked Control Systems . . . 927--942 Qianqian Pan and Jun Wu and Jianhua Li and Wu Yang and Mohsen Guizani Blockchain and Multi-Agent Learning Empowered Incentive IRS Resource Scheduling for Intelligent Reconfigurable Networks . . . . . . . . 943--958 Pedro Reviriego and Jim Apple and Alvaro Alonso and Otmar Ertl and Niv Dayan Cardinality Estimation Adaptive Cuckoo Filters (CE-ACF): Approximate Membership Check and Distinct Query Count for High-Speed Network Monitoring . . . . . 959--970 Hao Li and Yihan Dang and Guangda Sun and Changhao Wu and Peng Zhang and Danfeng Shan and Tian Pan and Chengchen Hu Programming Network Stack for Physical Middleboxes and Virtualized Network Functions . . . . . . . . . . . . . . . 971--986 Weihe Li and Paul Patras P-Sketch: a Fast and Accurate Sketch for Persistent Item Lookup . . . . . . . . . 987--1002 Chenyi Liu and Vaneet Aggarwal and Tian Lan and Nan Geng and Yuan Yang and Mingwei Xu and Qing Li FERN: Leveraging Graph Attention Networks for Failure Evaluation and Robust Network Design . . . . . . . . . 1003--1018 Jian Qu and Xiaobo Ma and Wenmao Liu and Hongqing Sang and Jianfeng Li and Lei Xue and Xiapu Luo and Zhenhua Li and Li Feng and Xiaohong Guan On Smartly Scanning of the Internet of Things . . . . . . . . . . . . . . . . . 1019--1034 Maria Diamanti and Christos Pelekis and Eirini Eleni Tsiropoulou and Symeon Papavassiliou Delay Minimization for Rate-Splitting Multiple Access-Based Multi-Server MEC Offloading . . . . . . . . . . . . . . . 1035--1047 Haitham H. Esmat and Beatriz Lorenzo Self-Learning Multi-Mode Slicing Mechanism for Dynamic Network Architectures . . . . . . . . . . . . . 1048--1063 Bai Liu and Quang Minh Nguyen and Qingkai Liang and Eytan Modiano Tracking Drift-Plus-Penalty: Utility Maximization for Partially Observable and Controllable Networks . . . . . . . 1064--1079 Soumadeep Das and Aryan Mohammadi Pasikhani and Prosanta Gope and John A. Clark and Chintan Patel and Biplab Sikdar AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks . . . . . . . . 1080--1095 Ehsan Etezadi and Carlos Natalino and Christine Tremblay and Lena Wosinska and Marija Furdek Programmable Filterless Optical Networks: Architecture, Design, and Resource Allocation . . . . . . . . . . 1096--1109 Mei Wang and Jing Chen and Kun He and Ruozhou Yu and Ruiying Du and Zhihao Qian UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials . . . . . . 1110--1123 Xiaoxue Yang and Hao Wang and Bing Hu and Chunming Wu ABOI: AWGR-Based Optical Interconnects for Single-Wavelength and Multi-Wavelength . . . . . . . . . . . . 1124--1139 Peikun Ni and Jianming Zhu and Guoqing Wang Activity-Oriented Production Promotion Utility Maximization in Metaverse Social Networks . . . . . . . . . . . . . . . . 1140--1154 Wenli Jiao and Ju Wang and Yelu He and Xiangdong Xi and Fuwei Wang and Dingyi Fang and Xiaojiang Chen Eliminating Design Effort: a Reconfigurable Sensing Framework for Chipless, Backscatter Tags . . . . . . . 1155--1170 Yu Li and Jiaheng Zhang and Junjie Chen and Yicong Chen and Ning Xie and Hongbin Li Privacy-Preserving Physical-Layer Authentication Under Cooperative Attacks 1171--1186 Jiani Guo and Shanshan Song and Jun Liu and Hao Chen and Jun-Hong Cui and Guangjie Han A Hybrid NOMA-Based MAC Protocol for Underwater Acoustic Networks . . . . . . 1187--1200 Tooba Faisal and Damiano Di Francesco Maesa and Nishanth Sastry and Simone Mangiante JITRA: Just-In-Time Resource Allocation Through the Distributed Ledgers for 5G and Beyond . . . . . . . . . . . . . . . 1201--1211 Juncheng Wang and Ben Liang and Min Dong and Gary Boudreau and Hatem Abou-Zeid Joint Online Optimization of Model Training and Analog Aggregation for Wireless Edge Learning . . . . . . . . . 1212--1228 Sihan Wang and Tian Xie and Min-Yue Chen and Guan-Hua Tu and Chi-Yu Li and Xinyu Lei and Po-Yi Chou and Fucheng Hsieh and Yiwen Hu and Li Xiao and Chunyi Peng Dissecting Operational Cellular IoT Service Security: Attacks and Defenses 1229--1244 Qian Li TCP FlexiS: a New Approach to Incipient Congestion Detection and Control . . . . 1245--1260 Liping Zhang and Wenshuo Han and Shukai Chen and Kim-Kwang Raymond Choo An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks . . . . . . . 1261--1272 Xuehe Wang and Shensheng Zheng and Lingjie Duan Dynamic Pricing for Client Recruitment in Federated Learning . . . . . . . . . 1273--1286 Yongqiang Liu and Xike Xie A Probabilistic Sketch for Summarizing Cold Items of Data Streams . . . . . . . 1287--1302 Xiujun Wang and Zhi Liu and Alex X. Liu and Xiao Zheng and Hao Zhou and Ammar Hawbani and Zhe Dang A Near-Optimal Protocol for Continuous Tag Recognition in Mobile RFID Systems 1303--1318 Racyus D. G. Pacífico and Lucas F. S. Duarte and Luiz F. M. Vieira and Barath Raghavan and José A. M. Nacif and Marcos A. M. Vieira eBPFlow: a Hardware/Software Platform to Seamlessly Offload Network Functions Leveraging eBPF . . . . . . . . . . . . 1319--1332 Jihyeon Yun and Atilla Eryilmaz and Jun Moon and Changhee Joo Remote Estimation for Dynamic IoT Sources Under Sublinear Communication Costs . . . . . . . . . . . . . . . . . 1333--1345 Tie Qiu and Xinwei Yang and Ning Chen and Songwei Zhang and Geyong Min and Dapeng Oliver Wu A Self-Adaptive Robustness Optimization Method With Evolutionary Multi-Agent for IoT Topology . . . . . . . . . . . . . . 1346--1361 Lun Wang and Yang Xu and Hongli Xu and Zhida Jiang and Min Chen and Wuyang Zhang and Chen Qian BOSE: Block-Wise Federated Learning in Heterogeneous Edge Computing . . . . . . 1362--1377
Haifeng Sun and Qun Huang and Patrick P. C. Lee and Wei Bai and Feng Zhu and Yungang Bao Distributed Network Telemetry With Resource Efficiency and Full Accuracy 1857--1872 Guangmeng Zhou and Qi Li and Yang Liu and Yi Zhao and Qi Tan and Su Yao and Ke Xu FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning . . . . . . . . . . . 1873--1887 Han Tian and Xudong Liao and Chaoliang Zeng and Decang Sun and Junxue Zhang and Kai Chen Efficient DRL-Based Congestion Control With Ultra-Low Overhead . . . . . . . . 1888--1903 Xiaobo Ma and Jian Qu and Mawei Shi and Bingyu An and Jianfeng Li and Xiapu Luo and Junjie Zhang and Zhenhua Li and Xiaohong Guan Website Fingerprinting on Encrypted Proxies: a Flow-Context-Aware Approach and Countermeasures . . . . . . . . . . 1904--1919 Haoyue Tang and Yin Sun and Leandros Tassiulas Sampling of the Wiener Process for Remote Estimation Over a Channel With Unknown Delay Statistics . . . . . . . . 1920--1935 Xiaolong Zheng and Dan Xia and Fu Yu and Liang Liu and Huadong Ma Enabling Cross-Technology Communication From WiFi to LoRa With IEEE 802.11ax . . 1936--1950 Wilson Ayyanthole Nelson and Sreenivasa Reddy Yeduri and Ajit Jha and Abhinav Kumar and Linga Reddy Cenkeramaddi RL-Based Energy-Efficient Data Transmission Over Hybrid BLE/LTE/Wi-Fi/LoRa UAV-Assisted Wireless Network . . . . . . . . . . . . . . . . 1951--1966 Seyed Mohammadhossein Tabatabaee and Anne Bouillard and Jean-Yves Le Boudec Worst-Case Delay Analysis of Time-Sensitive Networks With Deficit Round-Robin . . . . . . . . . . . . . . 1967--1982 Junyang Shi and Aitian Ma and Xia Cheng and Mo Sha and Peng Xi Adapting Wireless Network Configuration From Simulation to Reality via Deep Learning-Based Domain Adaptation . . . . 1983--1998 Reshma Prasad and Albert Sunny QoS-Aware Scheduling in 5G Wireless Base Stations . . . . . . . . . . . . . . . . 1999--2011 Ruijie Zhao and Mingwei Zhan and Xianwen Deng and Fangqi Li and Yanhao Wang and Yijun Wang and Guan Gui and Zhi Xue A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification . . . . . . . . . . . . . 2012--2025 Jingyu Xiao and Xudong Zuo and Qing Li and Dan Zhao and Hanyu Zhao and Yong Jiang and Jiyong Sun and Bin Chen and Yong Liang and Jie Li FlexNF: Flexible Network Function Orchestration for Scalable On-Path Service Chain Serving . . . . . . . . . 2026--2041 Yifan Yang and Wei Gong Universal WiFi Backscatter With Ambient Space-Time Streams . . . . . . . . . . . 2042--2052 Md. Ibrahim Ibne Alam and Elliot Anshelevich and Koushik Kar and Murat Yuksel Pricing for Efficient Traffic Exchange at IXPs . . . . . . . . . . . . . . . . 2053--2068 Qingkai Meng and Yiran Zhang and Shan Zhang and Zhiyuan Wang and Tong Zhang and Hongbin Luo and Fengyuan Ren Switch-Assistant Loss Recovery for RDMA Transport Control . . . . . . . . . . . 2069--2084 Xiaopeng Yao and Yunpeng Zhao and Ningtuo Gao and Hongwei Du and Hejiao Huang Causal Related Rumors Controlling in Social Networks of Multiple Information 2085--2098 Yan Wang and Quansheng Guan and Fei Ji and Weiqi Chen Impact and Analysis of Space-Time Coupling on Slotted MAC in UANs . . . . 2099--2111 Zhicheng Luo and Qianyi Huang and Xu Chen and Rui Wang and Fan Wu and Guihai Chen and Qian Zhang Spectrum Sensing Everywhere: Wide-Band Spectrum Sensing With Low-Cost UWB Nodes 2112--2127 Shuyue Li and Jing Li and Chaocan Xiang and Wenzheng Xu and Jian Peng and Ziming Wang and Weifa Liang and Xinwei Yao and Xiaohua Jia and Sajal K. Das Maximizing Network Throughput in Heterogeneous UAV Networks . . . . . . . 2128--2142 Tingting Xiao and Chen Chen and Mianxiong Dong and Kaoru Ota and Lei Liu and Schahram Dustdar Multi-Agent Reinforcement Learning-Based Trading Decision-Making in Platooning-Assisted Vehicular Networks 2143--2158 Zhifeng Hu and Chong Han and Xudong Wang Deep Reinforcement Learning Based Cross-Layer Design in Terahertz Mesh Backhaul Networks . . . . . . . . . . . 2159--2173 Qianyu Zhang and Gongming Zhao and Hongli Xu and Peng Yang XAgg: Accelerating Heterogeneous Distributed Training Through XDP-Based Gradient Aggregation . . . . . . . . . . 2174--2188 Baojun Chen and Jiawen Zhu and Shuai Zhang and Weiqiang Sun and Weisheng Hu Performances of Traffic Offloading in Data Center Networks With Steerable Free-Space Optical Communications . . . 2189--2204 Shouqian Shi and Xiaoxue Zhang and Chen Qian Concurrent Entanglement Routing for Quantum Networks: Model and Designs . . 2205--2220 Peng Sun and Guocheng Liao and Xu Chen and Jianwei Huang A Socially Optimal Data Marketplace With Differentially Private Federated Learning . . . . . . . . . . . . . . . . 2221--2236 Muhammad Sarmad Mir and Borja Genoves Guzman and Ambuj Varshney and Domenico Giustiniano LiFi for Low-Power and Long-Range RF Backscatter . . . . . . . . . . . . . . 2237--2252 Tao Zhang and Ran Huang and Jiawei Huang and Shaojun Zou and Chang Ruan and Kai Chen and Jianxin Wang and Geyong Min Taming the Aggressiveness of Heterogeneous TCP Traffic in Data Center Networks . . . . . . . . . . . . . . . . 2253--2268 Sebastiano Miano and Alireza Sanaee and Fulvio Risso and Gábor Rétvári and Gianni Antichi Morpheus: a Run Time Compiler and Optimizer for Software Data Planes . . . 2269--2284 Ningning Hou and Xianjin Xia and Yifeng Wang and Yuanqing Zheng One Shot for All: Quick and Accurate Data Aggregation for LPWANs . . . . . . 2285--2298
Xin Wang and Hong Shen and Hui Tian Scheduling Coflows in Hybrid Optical-Circuit and Electrical-Packet Switches With Performance Guarantee . . 2299--2314 Yutao Chen and Anthony Ephremides Minimizing Age of Incorrect Information Over a Channel With Random Delay . . . . 2752--2764 Bahman Abolhassani and John Tadrous and Atilla Eryilmaz and Serdar Yüksel Optimal Push and Pull-Based Edge Caching for Dynamic Content . . . . . . . . . . 2765--2777 Sheng-Hao Chiang and Chih-Hang Wang and De-Nian Yang and Wanjiun Liao and Wen-Tsuen Chen Online Multicast Traffic Engineering for Multi-View Videos With View Synthesis in SDN . . . . . . . . . . . . . . . . . . 2778--2793 Chen Gong and Zhenzhe Zheng and Yunfeng Shao and Bingshuai Li and Fan Wu and Guihai Chen ODE: an Online Data Selection Framework for Federated Learning With Limited Storage . . . . . . . . . . . . . . . . 2794--2809 Chris Misa and Ramakrishnan Durairajan and Reza Rejaie and Walter Willinger DynATOS+: a Network Telemetry System for Dynamic Traffic and Query Workloads . . 2810--2825 Guocong Quan and Atilla Eryilmaz and Ness B. Shroff Optimal Edge Caching for Individualized Demand Dynamics . . . . . . . . . . . . 2826--2841 Xiang Chen and Hongyan Liu and Qingjiang Xiao and Qun Huang and Dong Zhang and Haifeng Zhou and Boyang Zhou and Chunming Wu and Xuan Liu and Qiang Yang Hermes: Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program Deployment . . . . . . . . . . . 2842--2857 Ori Rottenstreich and Jose Yallouz Edge-Disjoint Tree Allocation for Multi-Tenant Cloud Security in Datacenter Topologies . . . . . . . . . 2858--2874 Holger Boche and Rafael F. Schaefer and H. Vincent Poor and Frank H. P. Fitzek On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks . . . . . . . . . 2875--2887 Junxu Xia and Lailong Luo and Bowen Sun and Geyao Cheng and Deke Guo Parallelized In-Network Aggregation for Failure Repair in Erasure-Coded Storage Systems . . . . . . . . . . . . . . . . 2888--2903 Jiuwu Zhang and Xiulong Liu and Sheng Chen and Xinyu Tong and Zeyu Deng and Tao Gu and Keqiu Li Toward Robust RFID Localization via Mobile Robot . . . . . . . . . . . . . . 2904--2919 Zimo Liao and Zhicheng Luo and Qianyi Huang and Linfeng Zhang and Fan Wu and Qian Zhang and Guihai Chen Gesture Recognition Using Visible Light on Mobile Devices . . . . . . . . . . . 2920--2935 Haojun Huang and Jialin Tian and Geyong Min and Hao Yin and Cheng Zeng and Yangming Zhao and Dapeng Oliver Wu Parallel Placement of Virtualized Network Functions via Federated Deep Reinforcement Learning . . . . . . . . . 2936--2949 Fabricio Mazzola and Augusto Setti and Pedro Marcos and Marinho Barcellos Analyzing Remote Peering Deployment and Its Implications for Internet Routing 2950--2959 Jonatha Anselmi Asynchronous Load Balancing and Auto-Scaling: Mean-Field Limit and Optimal Design . . . . . . . . . . . . . 2960--2971 Chuanpu Fu and Qi Li and Ke Xu Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection 2972--2987 Qi Shao and Man Hon Cheung and Jianwei Huang Strategic Pricing and Information Disclosure in Crowdfunding . . . . . . . 2988--3001 Shunmin Zhu and Jianyuan Lu and Biao Lyu and Tian Pan and Shize Zhang and Xiaoqing Sun and Chenhao Jia and Xin Cheng and Daxiang Kang and Yilong Lv and Fukun Yang and Xiaobo Xue and Xihui Yang and Zhiliang Wang and Jiahai Yang Proactive Telemetry in Large-Scale Multi-Tenant Cloud Overlay Networks . . 3002--3017 Minquan Cheng and Youlong Wu and Xianxian Li and Dianhua Wu Asymptotically Optimal Coded Distributed Computing via Combinatorial Designs . . 3018--3033 Jiatai Huang and Leana Golubchik and Longbo Huang When Lyapunov Drift Based Queue Scheduling Meets Adversarial Bandit Learning . . . . . . . . . . . . . . . . 3034--3044 Liang Mi and Tingting Yuan and Weijun Wang and Haipeng Dai and Lin Sun and Jiaqi Zheng and Guihai Chen and Xiaoming Fu Accelerated Neural Enhancement for Video Analytics With Video Quality Adaptation 3045--3060 Fei Wang and Ethan Hugh and Baochun Li More Than Enough is Too Much: Adaptive Defenses Against Gradient Leakage in Production Federated Learning . . . . . 3061--3075 Min-Yue Chen and Yiwen Hu and Guan-Hua Tu and Chi-Yu Li and Sihan Wang and Jingwen Shi and Tian Xie and Ren-Chieh Hsu and Li Xiao and Chunyi Peng and Zhaowei Tan and Songwu Lu Taming the Insecurity of Cellular Emergency Services (9-1-1): From Vulnerabilities to Secure Designs . . . 3076--3091 Batool Salehi and Utku Demir and Debashri Roy and Suyash Pradhan and Jennifer Dy and Stratis Ioannidis and Kaushik Chowdhury Multiverse at the Edge: Interacting Real World and Digital Twins for Wireless Beamforming . . . . . . . . . . . . . . 3092--3110 Yang Liu and Xi Wang and Xiaoqi Wang and Zhen Wang Fast Outbreak Sense and Effective Source Inference via Minimum Observer Set . . . 3111--3125 Xiaoliang Wang and Ke Xu and Yangfei Guo and Haiyang Wang and Songtao Fu and Qi Li and Bin Wu and Jianping Wu Toward Practical Inter-Domain Source Address Validation . . . . . . . . . . . 3126--3141 Rongxin Han and Jingyu Wang and Qi Qi and Dezhi Chen and Zirui Zhuang and Haifeng Sun and Xiaoyuan Fu and Jianxin Liao and Song Guo Dynamic Network Slice for Bursty Edge Traffic . . . . . . . . . . . . . . . . 3142--3157 Nicola Cordeschi and Floriano De Rango and Andrea Baiocchi Optimal Back-Off Distribution for Maximum Weighted Throughput in CSMA . . 3158--3172 Chih-Chun Wang Optimal AoI for Systems With Queueing Delay in Both Forward and Backward Directions . . . . . . . . . . . . . . . 3173--3188 Jiani Liu and Ju Ren and Yongmin Zhang and Sheng Yue and Yaoxue Zhang SESAME: a Resource Expansion and Sharing Scheme for Multiple Edge Services Providers . . . . . . . . . . . . . . . 3189--3204