


default search action
33rd INFOCOM 2014: Toronto, Canada - Workshops
- 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27 - May 2, 2014. IEEE 2014, ISBN 978-1-4799-3088-3

- Dana Petcu

, Elisabetta Di Nitto
, Danilo Ardagna
, Amor Solberg, Giuliano Casale
:
Towards Multi-Clouds engineering. 1-6 - Ansar Rafique, Stefan Walraven, Bert Lagaisse

, Tom Desair, Wouter Joosen:
Towards portability and interoperability support in middleware for hybrid clouds. 7-12 - Nikos Fotiou, Apostolis Machas, George C. Polyzos, George Xylomenos

:
Access control delegation for the cloud. 13-18 - Félix Cuadrado

, Álvaro Navas, Juan C. Dueñas, Luis M. Vaquero
:
Research challenges for cross-cloud applications. 19-24 - Walter Cerroni

:
Multiple virtual machine live migration in federated cloud systems. 25-30 - Hitoshi Yabusaki, Hiroshi Nakagoe, Koichi Murayama, Takatoshi Kato:

Wide area tentative scaling (WATS) for quick response in distributed cloud computing. 31-36 - Sam Johnston:

Simple workload & application portability (SWAP). 37-42 - Adrian Juan Verdejo, Bholanathsingh Surajbali, Henning Baars, Hans-Georg Kemper:

Moving Business Intelligence to cloud environments. 43-48 - André Almeida

, Everton Cavalcante
, Thaís Vasconcelos Batista
, Nélio Cacho, Frederico Lopes
:
A component-based adaptation approach for multi-cloud applications. 49-54 - Kari Visala, Andrew Keating, Rasib Hassan Khan:

Models and tools for the high-level simulation of a name-based interdomain routing architecture. 55-60 - Hrishikesh B. Acharya:

POPE and PaNeL : Fast lookup in routing tables. 61-66 - Hongbin Luo, Zhe Chen, Jianbo Cui, Hongke Zhang:

An approach for efficient, accurate, and timely estimation of traffic matrices. 67-72 - Spencer Sevilla, J. J. Garcia-Luna-Aceves:

HIDRA: Hiding mobility, multiplexing, and multi-homing from internet applications. 73-78 - Davide Careglio

, Dimitri Papadimitriou, Fernando Agraz, Sahel Sahhaf, Jordi Perelló
, Wouter Tavernier, Salvatore Spadaro, Didier Colle:
Development and experimentation towards a multicast-enabled Internet. 79-84 - Naeem Khademi, David Ros, Michael Welzl

:
The new AQM kids on the block: An experimental evaluation of CoDel and PIE. 85-90 - Chao Fang, F. Richard Yu

, Tao Huang
, Jiang Liu, Yunjie Liu:
Energy-efficient distributed in-network caching for Content-Centric Networks. 91-96 - Bin Nie, Honggang Zhang, Yong Liu

:
Social interaction based video recommendation: Recommending YouTube videos to facebook users. 97-102 - Abdelbasset Massouri, Leonardo S. Cardoso, Benjamin Guillon, Florin Doru Hutu

, Guillaume Villemaud, Tanguy Risset, Jean-Marie Gorce
:
CorteXlab: An open FPGA-based facility for testing SDR & cognitive radio networks in a reproducible environment. 103-104 - Davide Careglio

, Dimitri Papadimitriou, Fernando Agraz, Sahel Sahhaf, Jordi Perelló
, Wouter Tavernier:
On the experimentation of the novel GCMR multicast routing in a large-scale testbed. 105-106 - Nariman Farsad, Weisi Guo

, Andrew W. Eckford:
Molecular communication link. 107-108 - Xiuyan Jiang, Hanyang Pan, Dejian Ye:

REQMM : Real-time end-user QoE monitoring middleware for IP-based commercial TV service. 109-110 - Pingping Lin, Jun Bi, Ze Chen, Yangyang Wang, Hongyu Hu, Anmin Xu:

WE-bridge: West-east bridge for SDN inter-domain network peering. 111-112 - Yifei Xu, Yue Yan, Zhuyun Dai, Xiaolin Wang:

A management model for SDN-based data center networks. 113-114 - David Hock, Matthias Hartmann, Steffen Gebert, Thomas Zinner, Phuoc Tran-Gia:

POCO-PLC: Enabling dynamic pareto-optimal resilient controller placement in SDN networks. 115-116 - Yufeng Wang, Shaojie Tang, Chiu C. Tan:

Elastic data routing in cluster-based deduplication systems. 117-118 - Petros Spachos, Dimitrios Hatzinakos:

Energy Conserving Opportunistic Routing for self-powered wireless sensor networks. 119-120 - Xiaojun Chen, Fei Xu, Rui Xu, Siu-Ming Yiu, Jinqiao Shi:

A practical real-time authentication system with Identity Tracking based on mouse dynamics. 121-122 - Arijit Ukil, Soma Bandyopadhyay, Arpan Pal

:
IoT-Privacy: To be private or not to be private. 123-124 - Luis Sanabria-Russo

, Jaume Barceló, Azadeh Faridi, Boris Bellalta
:
WLANs throughput improvement with CSMA/ECA. 125-126 - Luis Amaral Lopes, Rute C. Sofia

, Hassan Osman, Huseyin Haci:
A proposal for elastic spectrum management in wireless local area networks. 127-128 - Yuanchao Shu

, Philippe Coué, Yinghua Huang, Jiaqi Zhang, Peng Cheng, Jiming Chen:
G-Loc: Indoor localization leveraging gradient-based fingerprint map. 129-130 - Evgeny Belyaev, Alexey V. Vinel, Magnus Jonsson, Katrin Sjöberg:

Live video streaming in IEEE 802.11p vehicular networks: Demonstration of an automotive surveillance application. 131-132 - Sachin Sharma

, Dimitri Staessens, Didier Colle, David Palma
, João Gonçalves, Mario Pickavet, Luís Cordeiro, Piet Demeester:
Demonstrating resilient quality of service in Software Defined Networking. 133-134 - Georgios S. Paschos, Chih-Ping Li, Eytan H. Modiano, Kostas Choumas

, Thanasis Korakis:
A demonstration of multirate multicast over an 802.11 mesh network. 135-136 - Jingguo Ge, Yulei Wu, Tong Li, Yuepeng E., Chi Zhang:

Experimenting adaptive services in sea-cloud innovation environment. 137-138 - Yanyan Zhuang, Leonard Law, Albert Rafetseder, Lai Wang, Ivan Beschastnikh, Justin Cappos:

Sensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devices. 139-140 - Yunchuan Guo, Lihua Yin, Li Chao:

Automatically verifying STRAC policy. 141-142 - Xianjin Xia

, ShiNing Li, Yu Zhang, Zhe Yang:
Poster: Energy balance bounds of mixed data transmission in wireless sensor networks. 143-144 - Kamran Nishat, Ruwaifa Anwar, Ahmed Mehfooz, Bilal Zaidi, Haris Choudhary, Ihsan Ayyub Qazi

:
On the effectiveness of high-speed WLAN standards for long distance communication. 145-146 - Adriano Faggiani, Pietro G. Giardina, Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi

, Alessandro Pischedda, Lorenzo Rossi, Luca Sani:
When traceroute Met BGP... How to reveal hidden internet as-level connectivity with Portolan and Isolario. 147-148 - Jinfan Wang

, Wei Gao
, Yuqing Liang, Rui Qin, Jianping Wang
, Shucheng Liu:
SD-ICN: An interoperable deployment framework for software-defined information-centric networks. 149-150 - Matthew Broadbent

, Panagiotis Georgopoulos, Vasileios Kotronis, Bernhard Plattner, Nicholas J. P. Race
:
OpenCache: Leveraging SDN to demonstrate a customisable and configurable cache. 151-152 - Aris Leivadeas, Chrysa Papagianni

, Symeon Papavassiliou:
Demonstration of a social aware wireless content delivery paradigm. 153-154 - Daniel Denkovski

, Valentin Rakovic
, Marko Angjelicinoski, Vladimir Atanasovski
, Liljana Gavrilovska:
Small-cells radio resource management based on Radio Environmental Maps. 155-156 - Pere Tuset-Peiró

, Luis Alonso
, Francisco Vazquez Gallego, Jesus Alonso-Zarate, Xavier Vilajosana-Guillen
:
Demonstrating Low-Power Distributed Queuing for active RFID communications at 433 MHz. 157-158 - Li Wang, Lie-Liang Yang, Victor C. M. Schober, Mei Song:

Adaptive cooperation schemes for energy efficient physical layer security. 159-160 - Daesung Choi, Sungdae Hong, Hyoung-Kee Choi:

A group-based security protocol for Machine Type Communications in LTE-Advanced. 161-162 - Yan Sun, Lihua Yin, Wenmao Liu:

Defending sybil attacks in mobile social networks. 163-164 - Licai Liu, Yunchuan Guo, Lihua Yin:

Analyzing asking/bidding price in dynamic game for cooperative authentication. 165-166 - Kai Sun, Zhikui Chen, Jiankang Ren, Song Yang, Jing Li:

M2C: Energy efficient mobile cloud system for deep learning. 167-168 - Ge Ma, Zhen Chen:

Comparative study on CCN and CDN. 169-170 - Dimitris Milioris, Philippe Jacquet:

SecLoc: Encryption system based on compressive sensing measurements for location estimation. 171-172 - Haoran Yu, Man Hon Cheung, Longbo Huang, Jianwei Huang

:
Delay-aware Predictive Network Selection in data offloading. 173-174 - Liang Zheng, Chee Wei Tan

:
Smart spectrum access algorithms in mobile TV white space networks for utility maximization. 175-176 - Diala Naboulsi, Marco Fiore

, Carla-Fabiana Chiasserini
:
Assessment of practical energy savings in cellular networks. 177-178 - Zhan Qin

, Jingbo Yan, Kui Ren
:
Private image computation: The case of cloud based privacy-preserving SIFT. 179-180 - Siyi Wang, Weisi Guo

, Mark D. McDonnell
:
Distance distributions for real cellular networks. 181-182 - Eduardo Mucelli Rezende Oliveira, Aline Carneiro Viana:

Routine-based network deployment. 183-184 - Hongliang Zhang

, Lili Ma, Lingyang Song, Zhu Han
:
Wireless Device-to-Device hypergraph optimization. 185-186 - Giwon Lee, Haneul Ko, Sangheon Pack

:
Proxy-based aggregated synchronization scheme in mobile cloud computing. 187-188 - Margit Mutschlechner, Florian Klingler

, Felix Erlacher, Florian Hagenauer, Marcel Kiessling, Falko Dressler
:
Reliable communication using Erasure Codes for monitoring bats in the wild. 189-190 - Muyuan Li, Si Chen, Kui Ren

:
Enabling private and non-intrusive smartphone calls with LipTalk. 191-192 - Boyang Zhou, Haifeng Zhou, Wen Gao, Xiaoyan Hong, Bin Wang, Chunming Wu:

Lossless reconfiguration protocol for multi-domain data plane in software-defined networks. 193-194 - Felipe D. da Cunha

, Aline Carneiro Viana, Raquel A. F. Mini, Antonio A. F. Loureiro:
Are vehicular networks small world? 195-196 - Boya Di, Siavash Bayat, Lingyang Song, Yonghui Li

:
Radio resource allocation for full-duplex OFDMA networks using matching theory. 197-198 - Cettina Barcellona, Ilenia Tinnirello

, Maria Luisa Merani
:
Rings for privacy: An architecture for privacy-preserving user profiling. 199-200 - Hossein Shokri Ghadikolaei

, Carlo Fischione
:
Random sensing order in cognitive radio systems: Performance evaluation and optimization. 201-202 - Haipeng Dai

, Yunhuai Liu, Guihai Chen
, Xiaobing Wu, Tian He:
SCAPE: Safe Charging with Adjustable PowEr. 203-204 - Junjie Zhu, Bo Chai, Jiming Chen:

Adaptive channel assignment testbed on MICAz. 205-206 - Teerawat Kumrai

, Kaoru Ota
, Mianxiong Dong
, Paskorn Champrasert
:
RSU placement optimization in vehicular participatory sensing networks. 207-208 - Siyi Wang, Weisi Guo

, Mark D. McDonnell
:
Transmit pulse shaping for molecular communications. 209-210 - Sérgio Figueiredo

, Seil Jeon
, Rui L. Aguiar
:
Empowering IP multicast for multimedia delivery over heterogeneous mobile wireless networks. 211-212 - Hani Salah, Benjamin Schiller, Thorsten Strufe:

CoMon: A system architecture for improving caching in CCN. 213-214 - Si Chen, Muyuan Li, Zhan Qin

, Bingsheng Zhang, Kui Ren
:
AcousAuth: An acoustic-based mobile application for user authentication. 215-216 - Si Chen, Muyuan Li, Kui Ren

:
The power of indoor crowd: Indoor 3D maps from the crowd. 217-218 - Zijie Zheng, Tianyu Wang, Lingyang Song, Zhu Han

, Jianjun Wu:
Social-aware multi-file dissemination in Device-to-Device overlay networks. 219-220 - Urs Niesen, Mohammad Ali Maddah-Ali:

Coded caching with nonuniform demands. 221-226 - Gauri Joshi, Yuval Kochman, Gregory W. Wornell

:
The effect of block-wise feedback on the throughput-delay trade-off in streaming. 227-232 - Arezou Pourmir, Parameswaran Ramanathan:

Distributed caching and coding in VoD. 233-238 - Eymen Kurdoglu, Yong Liu

, Yao Wang
:
Dealing with user heterogeneity in P2P multiparty video conferencing: Layered coding versus receiver partitioning. 239-244 - Zhe Yang, Lin Cai

, Xuan Wang, Siyuan Xiang, Jianping Pan
:
Hierarchical hexagonal modulation with ternary symbols for wireless video transmission. 245-250 - Zaheduzzaman Sarker, Varun Singh, Colin Perkins

:
An evaluation of RTP circuit breaker performance on LTE networks. 251-256 - Michael Markovitch, Gabriel Scalosub:

Bounded delay scheduling with packet dependencies. 257-262 - Petros Spachos, Angelos K. Marnerides

, Dimitrios Hatzinakos:
Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks. 263-268 - Laura Natali, Cettina Barcellona, Maria Luisa Merani

:
Leveraging users' likes in a video streaming P2P platform. 269-274 - Chenglin Li, Hongkai Xiong

, Junni Zou, Dapeng Oliver Wu
:
Dynamic rate allocation and opportunistic routing for scalable video multirate multicast over time-varying wireless networks. 275-280 - Gonzalo Munoz Ferrer, Hugo Méric, José Miguel Piquer

, Javier Bustos-Jiménez:
Performance evaluation of streaming algorithms for network cameras. 281-286 - Fabio Angius, Cédric Westphal, Mario Gerla, Giovanni Pau

:
WARP: A ICN architecture for social data. 287-292 - Lei Meng, Shu Liu, Aaron D. Striegel

:
Analyzing the impact of proximity, location, and personality on smartphone usage. 293-298 - Hye Joong Kang, Kown Y. Park, Kumin Cho, Chung Gu Kang:

Mobile caching policies for device-to-device (D2D) content delivery networking. 299-304 - Bidi Ying, Dimitrios Makrakis:

Protecting Location Privacy with Clustering Anonymization in vehicular networks. 305-310 - Jianwei Niu

, Lei Wang, Yixin Chen, Wenbo He
:
Detecting collusive cheating in online shopping systems through characteristics of social networks. 311-316 - Zhikui Chen, Qianzi Xiong, Yang Liu, Chongming Huang:

A strategy for differentiated access service selection based on application in WLANs. 317-322 - Evangelos Anifantis, Eleni Stai, Vasileios Karyotis

, Symeon Papavassiliou:
An MRF cross-layer resource allocation approach with back-pressure features for QoS in dynamic social and cognitive communications. 323-328 - Alireza Louni, K. P. Subbalakshmi

:
A two-stage algorithm to estimate the source of information diffusion in social media networks. 329-333 - Lorenzo Maggi, Francesco De Pellegrini:

Cooperative online native advertisement: A game theoretical scheme leveraging on popularity dynamics. 334-339 - Dominik Meiländer, Frank Glinka, Sergei Gorlatch, Li Lin, Wei Zhang, Xiaofei Liao:

Bringing mobile online games to clouds. 340-345 - Hyunseok Chang, Adiseshu Hari, Sarit Mukherjee, T. V. Lakshman:

Bringing the cloud to the edge. 346-351 - Mike Jia, Jiannong Cao

, Lei Yang:
Heuristic offloading of concurrent tasks for computation-intensive applications in mobile cloud computing. 352-357 - Huan Ke, Peng Li, Song Guo

:
Crowdsourcing on mobile cloud: Cost minimization of joint data acquisition and processing. 358-362 - Mohamad Kalil, Abdallah Shami

, Yinghua Ye:
Wireless resources virtualization in LTE systems. 363-368 - Yegui Cai, F. Richard Yu

, Shengrong Bu:
Cloud radio access networks (C-RAN) in mobile cloud computing systems. 369-374 - MohammadJavad NoroozOliaee, Bechir Hamdaoui, Mohsen Guizani, Mahdi Ben Ghorbel:

Online multi-resource scheduling for minimum task completion time in cloud servers. 375-379 - Xuanxia Yao

, Xiaoguang Han, Xiaojiang Du:
A lightweight access control mechanism for mobile cloud computing. 380-385 - Mehiar Dabbagh, Bechir Hamdaoui, Mohsen Guizani, Ammar Rayes:

Energy-efficient cloud resource management. 386-391 - Jaya Prakash Champati, Ben Liang

:
Energy Compensated Cloud Assistance in mobile cloud computing. 392-397 - Haleh Khojasteh, Jelena V. Misic, Vojislav B. Misic:

Characterizing energy consumption of IaaS clouds in non-saturated operation. 398-403 - Manjinder Nir, Ashraf Matrawy, Marc St-Hilaire:

An energy optimizing scheduler for mobile cloud computing environments. 404-409 - Giulio Grassi, Davide Pesavento

, Giovanni Pau
, Rama Vuyyuru, Ryuji Wakikawa, Lixia Zhang:
VANET via Named Data Networking. 410-415 - Jan Seedorf, Dirk Kutscher

, Fabian Schneider:
Decentralised binding of self-certifying names to real-world identities for assessment of third-party messages in fragmented mobile networks. 416-421 - J. J. Garcia-Luna-Aceves, Qian Li:

Efficient content routing in MANETs using distances to directories. 422-427 - You Lu, Xiao Li, Yu-Ting Yu, Mario Gerla:

Information-centric delay-tolerant mobile ad-hoc networks. 428-433 - Ioannis Psaras, Lorenzo Saino

, Mayutan Arumaithurai, K. K. Ramakrishnan
, George Pavlou:
Name-based replication priorities in disaster cases. 434-439 - Xiaoke Jiang, Jun Bi:

nCDN: CDN enhanced with NDN. 440-445 - Bertrand Mathieu, Patrick Truong:

A CCN-based Social Network application optimising network proximity. 446-451 - Yusung Kim, Younghoon Kim

, Ikjun Yeom:
Differentiated services in named-data networking. 452-457 - Atsushi Ooka, Shingo Ata, Kazunari Inoue, Masayuki Murata

:
Design of a high-speed content-centric-networking router using content addressable memory. 458-463 - Marica Amadeo

, Antonella Molinaro, Claudia Campolo
, Manolis Sifalakis
, Christian F. Tschudin:
Transport layer design for named data wireless networking. 464-469 - Jing Ren, Wen Qi, Cédric Westphal, Jianping Wang

, Kejie Lu, Shucheng Liu, Sheng Wang:
MAGIC: A distributed MAx-Gain In-network Caching strategy in information-centric networks. 470-475 - Spencer Sevilla, Priya Mahadevan, J. J. Garcia-Luna-Aceves:

iDNS: Enabling information centric networking through The DNS. 476-481 - José Quevedo

, Daniel Corujo
, Rui L. Aguiar:
Consumer driven information freshness approach for content centric networking. 482-487 - Bo Zhu, Xinxin Fan, Guang Gong:

Loxin - A solution to password-less universal login. 488-493 - Romain Fontugne, Johan Mazel, Kensuke Fukuda

:
Hashdoop: A MapReduce framework for network anomaly detection. 494-499 - José Camacho

, Gabriel Maciá-Fernández
, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro
:
Tackling the Big Data 4 vs for anomaly detection. 500-505 - Elias Bou-Harb

, Mourad Debbabi
, Chadi Assi:
Behavioral analytics for inferring large-scale orchestrated probing events. 506-511 - Xueli Huang, Xiaojiang Du:

Achieving big data privacy via hybrid cloud. 512-517 - Wenyi Liu, A. Selcuk Uluagac

, Raheem A. Beyah
:
MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data. 518-523 - Peng Li, Song Guo

:
Load balancing for privacy-preserving access to big data in cloud. 524-528 - Mianxiong Dong

, He Li
, Kaoru Ota
, Haojin Zhu
:
HVSTO: Efficient privacy preserving hybrid storage in cloud data center. 529-534 - Albert Brzeczko, A. Selcuk Uluagac

, Raheem A. Beyah
, John A. Copeland:
Active deception model for securing cloud infrastructure. 535-540 - Junggab Son, Donghyun Kim, Rasheed Hussain, Heekuck Oh:

Conditional proxy re-encryption for secure big data group sharing in cloud environment. 541-546 - Imdad Ullah

, Roksana Boreli, Mohamed Ali Kâafar
, Salil S. Kanhere
:
Characterising user targeting for in-App Mobile Ads. 547-552 - Jianjun Yang, Kun Hua

, Yin Wang, Wei Wang, Honggang Wang
, Ju Shen:
Automatic objects removal for scene completion. 553-558 - Chi Chen

, Xiaojie Zhu, Peisong Shen
, Jiankun Hu
:
A hierarchical clustering method for big data oriented ciphertext search. 559-564 - Fraida Fund, S. Amir Hosseini, Shivendra S. Panwar:

More bars, more bang for the buck: Channel-dependent pricing for video delivery to mobile users. 565-570 - Di Niu, Baochun Li:

Congestion-aware internet pricing for media streaming. 571-576 - Liang Zhang, Dan Wang

:
Sponsoring content: Motivation and pitfalls for content service providers. 577-582 - Yue Jin, Zhan Pang:

Smart data pricing: To share or not to share? 583-588 - Debasis Mitra, Qiong Wang:

The stability of best effort and Managed Services in the Internet, and the role of application creation. 589-594 - George Kesidis:

A simple two-sided market model with side-payments and ISP service classes. 595-597 - Hang Zhou, Randall A. Berry

, Michael L. Honig, Rakesh Vohra:
The impact of investment on price competition in unlicensed spectrum. 598-603 - Yuan Luo, Lin Gao, Jianwei Huang

:
Information market for TV white space. 604-609 - Mahdi Ghamkhari, Hamed Mohsenian Rad, Adam Wierman:

Optimal risk-aware power procurement for data centers in day-ahead and real-time electricity markets. 610-615 - John Tadrous, Atilla Eryilmaz, Hesham El Gamal:

Joint pricing and proactive caching for data services: Global and user-centric approaches. 616-621 - Subhash Lakshminarayana

, Tony Q. S. Quek
, H. Vincent Poor
:
Combining cooperation and storage for the integration of renewable energy in smart grids. 622-627 - Mohammad Rezaeian, Lachlan L. H. Andrew:

Lossy energy storage to cut power costs. 628-633 - Rozanna N. Jesudasan, Lachlan L. H. Andrew:

Scheduling long term energy storage. 634-639 - Byung-Gook Kim, Yu Zhang, Mihaela van der Schaar

, Jang-Won Lee
:
Dynamic pricing for smart grid with reinforcement learning. 640-645 - Deepjyoti Deka, Ross Baldick, Sriram Vishwanath:

Attacking power grids with secure meters: The case for breakers and Jammers. 646-651 - Sören Finster

, Ingmar Baumgart
:
SMART-ER: Peer-based privacy for smart metering. 652-657 - Andrew Beussink, Kemal Akkaya, Izzet F. Senturk

, Mohamed M. E. A. Mahmoud:
Preserving consumer privacy on IEEE 802.11s-based smart grid AMI networks using data obfuscation. 658-663 - Zhang Fu, Olaf Landsiedel, Magnus Almgren

, Marina Papatriantafilou
:
Managing your trees: Insights from a metropolitan-scale low-power wireless network. 664-669 - Gary Atkinson, Marina Thottan:

Leveraging advanced metering infrastructure for distribution grid asset management. 670-675 - Giovanni Neglia, Giuseppe Di Bella, Laura Giarré

, Ilenia Tinnirello
:
Unidirectional probabilistic direct control for deferrable loads. 676-681 - Nils Dorsch, Hanno Georg, Christian Wietfeld

:
Analysing the real-time-capability of wide area communication in smart grids. 682-687 - Roberto Bruschi

, Franco Davoli
, Maurizio Mongelli:
Equivalent bandwidth adaptation with energy preservation under delay constraints. 688-693 - Mahdi Ben Ghorbel, Bechir Hamdaoui, Rami Hamdi

, Mohsen Guizani, MohammadJavad NoroozOliaee:
Distributed dynamic spectrum access with adaptive power allocation: Energy efficiency and cross-layer awareness. 694-699 - Md Monzurul Alam

, Sudeep Bhattarai, Liang Hong, Sachin Shetty
:
Robust transmit beamforming against steering vector uncertainty in cognitive radio networks. 700-705 - Gozde Ozcan, Mustafa Cenk Gursoy:

Energy-efficient power adaptation for cognitive radio systems under imperfect channel sensing. 706-711 - Rodrigo A. Vaca Ramírez, John S. Thompson, Eitan Altman, Víctor M. Ramos R.:

A game theory framework for a distributed and energy efficient bandwidth expansion process. 712-717 - Shahid Mumtaz, Kazi Mohammed Saidul Huq

, Jonathan Rodriguez
:
Coordinated paradigm for D2D communications. 718-723 - Sunghwan Bae

, Hongseok Kim:
Unlimited cooperative sensing with energy detection for cognitive radio. 724-729 - Javier Mendonca Costa, Guowang Miao:

Context-aware Machine-to-Machine communications. 730-735 - Carlos H. M. de Lima, Mehdi Bennis

, Matti Latva-aho:
Modeling and analysis of handover failure probability in small cell networks. 736-741 - Nan Zhao, F. Richard Yu

, Hongjian Sun
:
Power allocation for interference alignment based cognitive radio networks. 742-746 - Zheng Chang

, Jie Gong, Tapani Ristaniemi:
Energy efficient resource allocation for collaborative mobile cloud with hybrid receiver. 747-752 - Michel Bourdellès, Julien Marechal:

Power consumption optimization for real-time applications: Results on a MAC application implementation. 753-758 - Amna Jamal, Chen-Khong Tham

, Wai-Choong Wong
:
Spectrum aware and energy efficient MAC protocol for cognitive radio sensor network. 759-764 - Ahmed S. B. Kozal

, Madjid Merabti, Faycal Bouhafs
:
Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networks. 765-770 - Konstantinos Pelechrinis:

Mining emerging user-centered network structures in location-based social networks. 771-776 - Galen J. Wilkerson

, Ramin Khalili, Stefan Schmid
:
Urban mobility scaling: Lessons from 'little data'. 777-782 - Giovanni Accongiagioco, Eitan Altman, Enrico Gregori, Luciano Lenzini:

A game theoretical study of peering vs transit in the internet. 783-788 - Lu Chen, Shin'ichi Arakawa, Masayuki Murata

, Hideyuki Koto, Nagao Ogino, Hidetoshi Yokota:
Designing an evolvable network with topological diversity. 789-794 - Elie Rotenberg, Christophe Crespelle, Matthieu Latapy:

Measuring routing tables in the internet. 795-800 - Jordan Viard, Matthieu Latapy:

Identifying roles in an IP network with temporal and structural density. 801-806 - Hussein Al-Zubaidy, Jörg Liebeherr:

Service characterizations for multi-Hop multiaccess wireless networks. 807-812 - Konstantin Avrachenkov

, Prithwish Basu, Giovanni Neglia, Bruno F. Ribeiro
, Donald F. Towsley
:
Pay few, influence most: Online myopic network covering. 813-818 - Giovanni Neglia, Xiuhui Ye, Maksym Gabielkov, Arnaud Legout

:
How to network in online social networks. 819-824 - Patricio Reyes

, Alonso Silva, Centre de Villarceaux:
Maximum coverage and maximum connected covering in social networks with partial topology information. 825-830 - Arunabha Sen, Anisha Mazumder, Joydeep Banerjee, Arun Das

, Randy Compton:
Identification of K most vulnerable nodes in multi-layered network using a new model of interdependency. 831-836 - Minas Gjoka, Emily Smith, Carter T. Butts:

Estimating clique composition and size distributions from sampled network data. 837-842 - Ali Dabirmoghaddam, J. J. Garcia-Luna-Aceves:

Scaling properties of random networks under proximity-based social relations. 843-848 - Minh X. Hoang, Ram Ramanathan, Ambuj K. Singh:

Structure and evolution of missed collaborations in large networks. 849-854

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














