infocom22

infocom 2011 论文列表

INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China.

Cost effective resource allocation of overlay routing relay nodes.
Client assignment for improving interactivity in distributed interactive applications.
Optimal Sybil-resilient node admission control.
A real-time multicast routing scheme for multi-hop switched fieldbuses.
Scan detection in high-speed networks based on optimal dynamic bit sharing.
Providing performance guarantees in multipass network processors.
Implications of device diversity for organic localization.
Spotter: A model based active geolocation service.
Scalable and fully distributed localization with mere connectivity.
Distinguishing locations across perimeters using wireless link measurements.
Risk sensitive optimal control framework applied to delay tolerant networks.
When does content float? Characterizing availability of anchored information in opportunistic content sharing.
Delay-capacity tradeoffs for mobile networks with Lévy walks and Lévy flights.
User-centric data dissemination in disruption tolerant networks.
Making wireless networks MORAL.
Efficient information collection protocols for sensor-augmented RFID networks.
Season: Shelving interference and joint identification in large-scale RFID systems.
Pipelining packet scheduling in a low latency optical packet switch.
Scheduling in mapreduce-like systems for fast completion time.
Scheduling for end-to-end deadline-constrained traffic with reliability requirements in multi-hop networks.
Exploiting channel memory for joint estimation and scheduling in downlink networks.
When compressive sampling meets multicast: Outage analysis and subblock network coding.
Base-station selections for qos provisioning over distributed multi-user MIMO links in wireless networks.
On a game theoretic approach to capacity maximization in wireless networks.
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets.
Performance analysis of spectrum handoff for cognitive radio ad hoc networks without common control channel under homogeneous primary traffic.
Optimal scheduling in cooperate-to-join Cognitive Radio Networks.
Opportunistic spectrum access for mobile cognitive radios.
Guaranteed opportunistic scheduling in multi-hop cognitive radio networks.
There's something about MRAI: Timing diversity can exponentially worsen BGP convergence.
BGP safety with spurious updates.
Local transit policies and the complexity of BGP Stability Testing.
IP fast ReRoute: Loop Free Alternates revisited.
PeerCast: Improving link layer multicast through cooperative relaying.
Improving energy efficiency of Wi-Fi sensing on smartphones.
Modeling and characterization of large-scale Wi-Fi traffic in public hot-spots.
Adaptive flow control for TCP on mobile phones.
A cross-domain privacy-preserving protocol for cooperative firewall optimization.
TCP-FIT: An improved TCP congestion control algorithm and its performance.
Adaptive delay-based congestion control for high bandwidth-delay product networks.
Which protocol? Mutual interaction of heterogeneous congestion controllers.
Throughput-optimal random access with order-optimal delay.
Content-aware caching and traffic management in content distribution networks.
A nearly-optimal index rule for scheduling of users with abandonment.
Taming user-generated content in mobile networks via Drop Zones.
Capacity scaling of multihop cellular networks.
Optimal relay location and power allocation for low SNR broadcast relay channels.
Truthful spectrum auctions with approximate revenue.
On adaptive-width channel allocation in non-cooperative, multi-radio wireless networks.
Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service.
Network modulation: A new dimension to enhance wireless network performance.
Many-to-one deliverability of greedy routing in 2-D wireless sensor networks.
Energy efficient clustering for WSN-based structural health monitoring.
A framework for mobile data gathering with load balanced clustering and MIMO uploading.
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs.
Network selection for secondary users in cognitive radio systems.
Transport throughput of secondary networks in spectrum sharing systems.
Optimal Cooperative Sensing Scheduling for energy-efficient Cognitive Radio Networks.
Exploiting MIMO antennas in cooperative cognitive radio networks.
The wireless multicast coalition game and the non-cooperative association problem.
User subscription dynamics and revenue maximization in communications markets.
A packet dropping-based incentive mechanism for M/M/1 queues with selfish users.
Multi-hop access pricing in public area WLANs.
CHAIN: Introducing minimum controlled coordination into random access MAC.
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs.
Identifying mobiles hiding behind wireless routers.
New insights into the stochastic geometry analysis of dense CSMA networks.
Measurement and analysis of global IP-usage patterns of fast-flux botnets.
I-seismograph: Observing and measuring Internet earthquakes.
Public DNS system and Global Traffic Management.
Overflow management with multipart packets.
On the limitations of randomization for Queue-Length-Based Scheduling in wireless networks.
A low-complexity congestion control and scheduling algorithm for multihop wireless networks with order-optimal per-flow delay.
Delay-based Back-Pressure scheduling in multi-hop wireless networks.
Multicell coordination via joint scheduling, beamforming and power spectrum adaptation.
Downlink power control for variable bit rate videos over multicell wireless networks.
Optimal power control in Rayleigh-fading heterogeneous networks.
Belief propagation methods for intercell interference coordination.
Traffic-tracing gateway (TTG).
Distributed power control in the SINR model.
Joint distributed access point selection and power allocation in cognitive radio networks.
r-Kernel: An operating system foundation for highly reliable networked embedded systems.
Visual correlation-based image gathering for wireless multimedia sensor networks.
On-demand time synchronization with predictable accuracy.
ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks.
Online learning in opportunistic spectrum access: A restless bandit approach.
Wi-Fi 2.0: Price and quality competitions of duopoly cognitive radio wireless service providers with time-varying spectrum availability.
Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks.
FindU: Privacy-preserving personal profile matching in mobile social networks.
Long PN code based DSSS watermarking.
Scheduling design and analysis for end-to-end heterogeneous flows in an avionics network.
Location privacy protection from RSS localization system using antenna pattern synthesis.
Forwarding anomalies in Bloom filter-based multicast.
Handling network uncertainty in heterogeneous wireless networks.
VIRO: A scalable, robust and namespace independent virtual Id routing for future networks.
Estimating the performance of hypothetical cloud service deployments: A measurement-based approach.
Efficient network-wide flow record generation.
RelSamp: Preserving application structure in sampled flow measurements.
Maximizing throughput in wireless networks with finite internal buffers.
Low-complexity scheduling algorithm for sum-queue minimization in wireless convergecast.
Weighted wireless link scheduling without information of positions and interference/communication radii.
Queue length asymptotics for generalized max-weight scheduling in the presence of heavy-tailed traffic.
Prevalence and mitigation of forum spamming.
SocialFilter: Introducing social trust to collaborative spam mitigation.
Relationship classification in large scale online social networks and its impact on information propagation.
Adaptive algorithms for detecting community structure in dynamic social networks.
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks.
Connected coverage in wireless networks with directional antennas.
Sparse target counting and localization in sensor networks based on compressive sensing.
Ubiquitous data collection for mobile users in wireless sensor networks.
Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply.
Pricing-based spectrum access control in cognitive radio networks with random access.
To preempt or not: Tackling bid and time-based cheating in online spectrum auctions.
Throughput and delay scaling of general cognitive networks.
ETP: Encounter Transfer Protocol for opportunistic vehicle communication.
Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks.
Trajectory improves data delivery in vehicular networks.
Human factors-aware service scheduling in Vehicular Cyber-Physical systems.
Adaptive wireless channel probing for shared key generation.
Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel.
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
A dynamic game solution to malware attack.
An efficient regular expressions compression algorithm from a new perspective.
Firewall verification and redundancy checking are equivalent.
FEACAN: Front-end acceleration for content-aware network processing.
Sampling vs sketching: An information theoretic comparison.
On the growth of Internet application flows: A complex network perspective.
Compressive sensing over graphs.
Network-aware behavior clustering of Internet end hosts.
Network warehouses: Efficient information distribution to mobile users.
DARP: Distance-aware relay placement in WiMAX mesh networks.
Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networks.
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks.
TinyLTS: Efficient network-wide Logging and Tracing System for TinyOS.
KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks.
Robust coverage under uncertainty in wireless sensor networks.
Energy provisioning in wireless rechargeable sensor networks.
Optimal sampling algorithms for frequency estimation in distributed data.
On the convergence to fairness in overloaded FIFO systems.
On expressing networks with flow transformations in convolution-form.
Pay bursts only once holds for (some) non-FIFO systems.
Stable throughput tradeoffs in cognitive shared channels with cooperative relaying.
Secure group key management using uni-directional proxy re-encryption schemes.
Keep your friends close: Incorporating trust into social network-based Sybil defenses.
A novel family of geometric planar graphs for wireless ad hoc networks.
On progressive network recovery after a major disruption.
An optimal link layer model for multi-hop MIMO networks.
Consort: Node-Constrained Opportunistic Routing in wireless mesh networks.
Optimizing network-coded cooperative communications via joint session grouping and relay node selection.
APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services.
Identity-based attack detection in mobile wireless networks.
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
IMDGuard: Securing implantable medical devices with the external wearable guardian.
Space-time tradeoff in regular expression matching with semi-deterministic finite automata.
Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems.
SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box.
Network-wide monitoring through self-configuring adaptive system.
A foundation for stochastic bandwidth estimation of networks with random service.
Modeling residual-geometric flow sampling.
Fast and compact per-flow traffic measurement through randomized counter sharing.
Minimizing service delay in directional sensor networks.
On full-view coverage in camera sensor networks.
Sensor localization with deterministic accuracy guarantee.
Secure continuous aggregation via sampling-based verification in wireless sensor networks.
Approximate distance queries and compact routing in sparse graphs.
One memory access bloom filters and their generalization.
Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks.
Opportunistic scheduling with worst case delay guarantees in single and multi-hop networks.
Exploiting sensing diversity for confident sensing in wireless sensor networks.
Protection of query privacy for continuous location based services.
Aggregation capacity of wireless sensor networks: Extended network case.
Performance modeling of hybrid optical packet switches with shared buffer.
Optimal control of epidemic evolution.
On the achievable throughput of CSMA under imperfect carrier sensing.
Defending against vehicular rogue APs.
Maintaining source privacy under eavesdropping and node compromise attacks.
Secure friend discovery in mobile social networks.
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks.
Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection.
A first look at inter-data center traffic characteristics via Yahoo! datasets.
SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks.
Networking low-power energy harvesting devices: Measurements and algorithms.
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access.
Information delivery in large wireless networks with minimum energy expense.
Energy-latency tradeoff for in-network function computation in random networks.
Maximizing lifetime for the shortest path aggregation tree in wireless sensor networks.
Construction of directional virtual backbones with minimum routing cost in wireless networks.
Agnostic diagnosis: Discovering silent failures in wireless sensor networks.
Self-diagnosis for large scale wireless sensor networks.
Packet scheduling in a low-latency optical switch with wavelength division multiplexing and electronic buffer.
The resilience of WDM networks to probabilistic geographical failures.
A robust optimization approach to backup network design with random failures.
A study of the routing and spectrum allocation in spectrum-sliced Elastic Optical Path networks.
The impact of storage capacity on end-to-end delay in time varying networks.
The capacity of three-dimensional wireless ad hoc networks.
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks.
Modeling the economic value of the location data of mobile users.
Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints.
The streaming capacity of sparsely-connected P2P systems with distributed control.
Predicting the impact of measures against P2P networks on the transient behaviors.
On the vulnerability of the proportional fairness scheduler to retransmission attacks.
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks.
Delay-bounded adaptive UFH-based anti-jamming wireless communication.
Device fingerprinting to enhance wireless security using nonparametric Bayesian method.
Channel allocation in wireless data center networks.
Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center.
Modeling and understanding TCP incast in data center networks.
Exploring efficient and scalable multicast routing in future data center networks.
Energy-aware scheduling algorithms for network stability.
On renewable sensor networks with wireless energy transfer.
On optimal throughput-energy curve for multi-hop wireless networks.
Managing cost, performance, and reliability tradeoffs for energy-aware server provisioning.
Multiple task scheduling for low-duty-cycled wireless sensor networks.
Delay-bounded MAC with minimal idle listening for sensor networks.
PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks.
Analysis of event detection delay in wireless sensor networks.
Scheduling in wireless ad hoc networks with successive interference cancellation.
QoSoDoS: If you can't beat them, join them!
ESPN: Efficient server placement in probabilistic networks with budget constraint.
Delay asymptotics with retransmissions and fixed rate codes over erasure channels.
Scheduling for small delay in multi-rate multi-channel wireless networks.
The impact of link scheduling on long paths: Statistical analysis and optimal bounds.
Index-based sampling policies for tracking dynamic networks under sampling constraints.
On the efficiency of collaborative caching in ISP-aware P2P networks.
Self-repairing homomorphic codes for distributed storage systems.
Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluation.
Asymptotic optimality of randomized peer-to-peer broadcast with network coding.
Experimental evaluation of optimal CSMA.
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd.
TurboSync: Clock synchronization for shared media networks via principal component analysis with missing data.
Fingerprinting 802.11 rate adaption algorithms.
Sequential learning for optimal monitoring of multi-channel wireless networks.
A highly scalable bandwidth estimation of commercial hotspot access points.
Contrabass: Concurrent transmissions without coordination for ad hoc networks.
Physical layer wireless security made fast and channel independent.
Approximation algorithms for throughput maximization in wireless networks with delay constraints.
Multicast video delivery with switched beamforming antennas in indoor wireless networks.
Dynamic right-sizing for power-proportional data centers.
A QoS aware multicore hash scheduler for network applications.
Minimizing retrieval latency for content cloud.
Pan and scan: Configuring cameras for coverage.
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection.
A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface.
Fine-grained location-free planarization in wireless sensor networks.
I2NC: Intra- and inter-session network coding for unicast flows in wireless networks.
Padding for orthogonality: Efficient subspace authentication for network coding.
SigSag: Iterative detection through soft message-passing.
Anonymous communication with network coding against traffic analysis attack.
Random mobility and the spread of infection.
Local sufficient rate constraints for guaranteed capacity region in multi-radio multi-channel wireless networks.
Asymptotic distribution of critical transmission radius for greedy forward routing.
Fundamental lower bound for node buffer size in intermittently connected wireless networks.
Deep diving into BitTorrent locality.
Hidden communication in P2P networks Steganographic handshake and broadcast.
Statistical modeling and analysis of P2P replication to support VoD service.
Novasky: Cinematic-quality VoD in a P2P storage cloud.
Connectivity maintenance in mobile wireless networks via constrained mobility.
C4: A new paradigm for providing incentives in multi-hop wireless networks.
A hierarchical account-aided Reputation Management system for large-scale MANETs.
On power and throughput tradeoffs of WiFi and Bluetooth in smartphones.
Self-supported congestion-aware networking for emergency services in WANETs.
Understanding traffic dynamics in cellular data networks.
Does wireless sensor network scale? A measurement study on GreenOrbs.
Delay constrained minimum energy broadcast in cooperative wireless networks.
DragonNet: A robust mobile Internet service system for long distance trains.
Multiflows in multi-channel multi-radio multihop wireless networks.
Wireless link scheduling under physical interference model.
Privacy-preserving multi-keyword ranked search over encrypted cloud data.
Secure and practical outsourcing of linear programming in cloud computing.
Agnostic topology-based spam avoidance in large-scale web crawls.
Twinkle: A fast resource provisioning mechanism for internet services.
Continuous multi-dimensional top-k query processing in sensor networks.
CABET: Connectivity-based boundary extraction of large-scale 3D sensor networks.
QoF: Towards comprehensive path quality measurement in wireless sensor networks.
Universal and robust distributed network codes.
Optimal Design of Linear Network Coding for information theoretically secure unicast.
GestureFlow: Streaming gestures to an audience.
Capacity of byzantine agreement with finite link capacity.
A general probabilistic framework for detecting community structure in networks.
Beyond MLU: An application-centric comparison of traffic engineering schemes.
General capacity scaling of wireless networks.
Heterogeneity increases multicast capacity in clustered network.
Optimal content placement for peer-to-peer video-on-demand systems.
Hop limited flooding over dynamic networks.
A model approach to estimate Peer-to-Peer traffic matrices.
Toward P2P-based multimedia sharing in user generated contents.
Sharing multiple messages over mobile networks.
Converge-cast with MIMO.
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective.
On the asymptotic connectivity of random networks under the random connection model.
One-way barrier coverage with wireless sensors.
Spherical representation and polyhedron routing for load balancing in wireless sensor networks.
GeoQuorum: Load balancing and energy efficient data access in wireless sensor networks.
Smart sleep: Sleep more to reduce delay in duty-cycled wireless sensor networks.
Safeguarding schedule updates in wireless sensor networks.
Global weighted fairness guaranteed congestion avoidance protocol for wireless sensor networks.
Revenue sharing among ISPs in two-sided markets.
Stackelberg games for energy-efficient power control in wireless networks.
Seen as stable marriages.
Towards an efficient algorithmic framework for pricing cellular data service.
EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants.
Incentive provision using intervention.
"Who Are Your Friends?" - A Simple Mechanism that achieves perfect network formation.
A distributed and privacy preserving algorithm for identifying information hubs in social networks.
Optimizing information credibility in social swarming applications.
Bayesian-inference based recommendation in online social networks.
Statistical behavior of embeddedness and communities of overlapping cliques in online social networks.
Bring order to online social networks.
Optimized asynchronous multi-channel neighbor discovery.
On cooperative strategies in wireless relay networks.
Wireless data multicasting with switched beamforming antennas.
Achieving congestion diversity in wireless ad-hoc networks.
Analysis and algorithms for partial protection in mesh networks.
Local pooling factor of multihop wireless networks.
Information capacity of diffusion-based molecular communication in nanonetworks.
Zoom: A multi-resolution tasking framework for crowdsourced geo-spatial sensing.
Spatio-temporal modeling of wireless users internet access patterns using self-organizing maps.
A state action frequency approach to throughput maximization over uncertain wireless channels.
Clustering in cooperative networks.
Equilibriums in slow fading interfering channels with partial knowledge of the channels.
OpenFlow based flow level bandwidth provisioning for CICQ switches.
Effect of buffers on stability of Internet congestion controllers.
Structural properties of optimal coordinate-convex policies for CAC with nonlinearly-constrained feasibility regions.
Multiple timescale dispatch and scheduling for stochastic reliability in smart grids with wind generation integration.
Resource management for fading wireless channels with energy harvesting nodes.
Energy-efficient design and optimization of wireline access networks.
Timely data delivery in a realistic bus network.
Utilizing shared vehicle trajectories for data forwarding in vehicular networks.
Information propagation speed in bidirectional vehicular delay tolerant networks.
PVA in VANETs: Stopped cars are not silent.
Content downloading in vehicular networks: What really matters.
Demand forecast and performance prediction in peer-assisted on-demand streaming systems.
The digital rights management game in peer-to-peer streaming systems.
Peering through the iframe.
Reinforcement learning in BitTorrent systems.
Quantifying paedophile queries in a large P2P system.
Spectrum shaping via network coding in cognitive radio networks.
Resource allocation for multicast in an OFDMA network with Random Network Coding.
Highly available virtual machines with network coding.
On file-based content distribution over wireless networks via multiple paths: Coding and delay trade-off.
ℛ2: Incremental ℛeprogramming using ℛelocatable code in networked embedded systems.
Fast mixing of parallel Glauber dynamics and low-delay CSMA scheduling.
On link rate adaptation in 802.11n WLANs.
Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks.
Efficient missing tag detection in RFID systems.
Decoding the collisions in RFID systems.
Biometric-based two-level secure access control for Implantable Medical Devices during emergencies.
Designing localization algorithms robust to signal strength attacks.
Reconciling privacy preservation and intrusion detection in sensory data aggregation.
Distributed privacy-preserving access control in a single-owner multi-user sensor network.
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs.
On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregation.
Scheduling in parallel queues with randomly varying connectivity and switchover delay.
Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup.
Offset addressing approach to memory-efficient IP address lookup.
Exploiting graphics processors for high-performance IP lookup in software routers.
SelectCast: Scalable data aggregation scheme in wireless sensor networks.
The last minute: Efficient Data Evacuation strategy for sensor networks in post-disaster applications.
Scheduling data collection with dynamic traffic patterns in wireless sensor networks.
iLight: Indoor device-free passive tracking using wireless sensor networks.
Localization in non-localizable sensor and ad-hoc networks: A Localizability-aided approach.
Robust multipath routing in large wireless networks.
Content management in a mobile ad hoc network: Beyond opportunistic strategy.
Distributed subgradient methods for Delay Tolerant Networks.
A dynamic relay selection scheme for mobile users in wireless relay networks.
Social-aware stateless forwarding in pocket switched networks.
On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks.
On the throughput scaling of Cognitive Radio ad hoc networks.
Asynchronous channel hopping for establishing rendezvous in cognitive radio networks.
Cooperative energy spanners: Energy-efficient topology control in cooperative ad hoc networks.
Information propagation speed study in multihop cognitive radio networks.
A cost-benefit framework for judicious enterprise network redesign.
Limits of energy saving for the allocation of data center resources to networked applications.
CloudFlex: Seamless scaling of enterprise applications into the cloud.
Kingfisher: Cost-aware elasticity in the cloud.
CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy.
Multi-field range encoding for packet classification in TCAM.
PhishDef: URL names say it all.
A novel packet size based covert channel attack against anonymizer.
Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection.
A comparative study of two network-based anomaly detection methods.
DomainImpute: Inferring unseen components in the Internet.
Timeouts with time-reversed linear probing.
Analysis on the fluctuation magnitude in probe interval for active measurement.
A new virtual indexing method for measuring host connection degrees.
Inferring traffic shaping and policy parameters using end host measurements.
BGP molecules: Understanding and predicting prefix failures.
Efficient multicasting approaches using collection-distribution networks.
A comparative performance analysis of IP traffic offloading schemes over Dynamic Circuits.
Geography-based analysis of the Internet infrastructure.
On the network geography of the Internet.
Un-zipping cellular infrastructure locations via user geo-intent.
Open or close: On the sharing of femtocells.
Optimization method for the joint allocation of modulation schemes, coding rates, resource blocks and power in self-organizing LTE networks.
Optimal control for base station sleep mode in energy efficient radio access networks.
Making sense of customer tickets in cellular networks.
Efficient allocation of CQI channels in broadband wireless networks.
Towards robust and efficient routing in multi-radio, multi-channel wireless mesh networks.
A prior-free revenue maximizing auction for secondary spectrum access.
SMALL: A Strategy-proof Mechanism for radio spectrum allocation.
Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relaying.
Consolidating virtual machines with dynamic bandwidth demand in data centers.
Application-aware virtual machine migration in data centers.
BCN: Expansible network structures for data centers using hierarchical compound graphs.
RDCM: Reliable data center multicast.
On mitigating TCP Incast in Data Center Networks.
Collaborative firewalling in wireless networks.
You can SPIT, but you can't hide: Spammer identification in telephony networks.
Hearing is believing: Detecting mobile primary user emulation attack in white space.
Privacy analysis of user association logs in a large-scale wireless LAN.
Truthful online spectrum allocation and auction in multi-channel wireless networks.
Exploiting Tag-based Path Diversity in the DLG-Kautz network.
Describing and forecasting video access patterns.
Space-efficient tracking of network-wide flow correlations.
Decentralized, accurate, and low-cost network bandwidth prediction.
Understanding robustness of mobile networks through temporal network measures.