infocom 2013 论文列表
2013 Proceedings IEEE INFOCOM Workshops, Turin, Italy, April 14-19, 2013.
|
Improving AS relationship inference using PoPs.
SpamTracer: How stealthy are spammers?
Gaining insight into AS-level outages through analysis of Internet Background Radiation.
10 Gbit line rate packet-to-disk using n2disk.
Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs.
Rogue femtocell owners: How mallory can monitor my devices.
Self-Learning Classifier for Internet traffic.
To the Moon and back: Are Internet bufferbloat delays really that large?
Fighting the bufferbloat: On the coexistence of AQM and low priority congestion control.
Troubleshooting slow webpage downloads.
New generation satellite broadband Internet services: Should ADSL and 3G worry?
Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network.
Modeling DNS agility with DNSMap.
Check-Repeat: A new method of measuring DNSSEC validating resolvers.
Smart Data Pricing: Lessons from trial planning.
Pricing algorithms for the day-ahead electricity market with flexible consumer participation.
Tiered billing scheme for residential load scheduling with bidirectional energy trading.
Economics of WiFi offloading: Trading delay for cellular capacity.
Economics of mobile data offloading.
Economic models of sponsored content in wireless networks with uncertain demand.
On the CDN pricing game.
On the interaction between content-oriented traffic scheduling and revenue sharing among providers.
SpeedGate: A smart data pricing testbed based on speed tiers.
Pricing for demand shaping and proactive download in smart data networks.
Analysis and applications of smartphone user mobility.
Ego networks in Twitter: An experimental analysis.
Finding critical regions in a network.
The strength of vicinity annexation in opportunistic networking.
Inferring cellular user demographic information using homophily on call graphs.
Exploring venue popularity in foursquare.
Surviving in a competitive market of information providers.
On the impact of global information on diffusion of innovations over social networks.
Information diffusion in heterogeneous networks: The configuration model approach.
Emergence of equilibria from individual strategies in online content diffusion.
The twofold nature of Autonomous Systems: evidence combining stock market data with topological properties.
Robust QoS-guaranteed network engineering in interference-aware wireless networks.
Detecting encrypted botnet traffic.
Trade-off analysis of Multi Topology Routing based IP fast reroute mechanisms.
Network emulation testbed for DTN applications and protocols.
COBRA: A framework for the analysis of realistic mobility models.
Into the Moana1 - Hypergraph-based network layer indirection.
Applying Software-Defined Networking to the telecom domain.
AliasCluster: A lightweight approach to interface disambiguation.
Improving the discovery of IXP peering links through passive BGP measurements.
The BGP Visibility Scanner.
DRAGO: Detecting, quantifying and locating hidden routers in Traceroute IP paths.
DHT-based traffic localization in the wild.
On the usage patterns of multi-modal communication: Countries and evolution.
Modeling and characterization of vehicular density at scale.
Data dissemination bounds in people-centric systems.
A simple approximate analysis of floating content for context-aware applications.
Efficient dynamic spectrum sharing through rate compensation and spectrum handoff.
On the impact of disorder on dynamic network navigation.
Electricity cost efficient workload mapping.
MAC-aware routing metrics for low power and lossy networks.
Distributed scheduling for scalable P2P video streaming with Network Coding.
Energy-harvesting WSNs for structural health monitoring of underground train tunnels.
Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Enhancing Traffic Sampling scope and efficiency.
Impact of a sleep schedule on the AODV convergence time in WSNs.
Efficient caching in Content-Centric Networks using OpenFlow.
A reverse transmission mechanism for surveillance network in smart grid.
Robust privacy-preserving authentication scheme for communication between Electric Vehicle as Power Energy Storage and power stations.
A novel method to detect bad data injection attack in smart grid.
Performance evaluation of time-critical communication networks for Smart Grids based on IEC 61850.
Elderberry: A peer-to-peer, privacy-aware smart metering protocol.
Advanced Metering and Demand Response communication performance in Zigbee based HANs.
Cost-aware optimization models for communication networks with renewable energy sources.
A cross-layer perspective on energy harvesting aided green communications over fading channels.
Real-time welfare-maximizing regulation allocation in aggregator-EVs systems.
Real time market models and prosumer profiling.
Sustainable energy consumption monitoring in residential settings.