default search action
22nd ICCCN 2013: Nassau, Bahamas
- 22nd International Conference on Computer Communication and Networks, ICCCN 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013. IEEE 2013, ISBN 978-1-4673-5774-6
- Wei Liu, E. K. Park:
e-Health AON (Application-Oriented Networks). 1-7 - Hao Wu, Jun Li, Yi Wang, Bin Liu:
EMC: The Effective Multi-Path Caching Scheme for Named Data Networking. 1-7 - Abhishek Dwaraki, Tilman Wolf:
Service Instantiation in an Internet with Choices. 1-7 - Ismail AlQerm, Basem Shihada, Kang G. Shin:
CogWnet: A Resource Management Architecture for Cognitive Wireless Networks. 1-7 - Matteo Varvello, Jairo O. Esteban, Mark Smith, Lloyd G. Greenwald, Yang Guo, Mary R. Schurgot:
Range Queries in MANET: Can Information-Centric Networking Help? 1-6 - Yang Guo, Lloyd G. Greenwald, Mary R. Schurgot, Matteo Varvello:
Performance Model for a Cache Enabled Content Distribution Framework over MANET. 1-8 - Xin Li, Jie Wu, Sanglu Lu:
QoS-Aware Service Selection in Geographically Distributed Clouds. 1-5 - Rehana Tabassum, Klara Nahrstedt, Edmond Rogers, King-Shan Lui:
SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication. 1-5 - Raul Landa, Richard G. Clegg, João Taveira Araújo, Eleni Mykoniati, David Griffin, Miguel Rio:
Measuring the Relationships between Internet Geography and RTT. 1-7 - Mehrdad Khaledi, Alhussein A. Abouzeid:
A Reserve Price Auction for Spectrum Sharing with Heterogeneous Channels. 1-7 - Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
Secure Verification of Location Claims on a Vehicular Safety Application. 1-7 - José Vieira, Francisco Ganhão, Luís Bernardo, Rui Dinis, Marko Beko, Rodolfo Oliveira, Paulo Pinto:
Energy-Efficient QoS Provisioning in Random Access Satellite NDMA Schemes. 1-9 - Arash Nourian, Muthucumaru Maheswaran:
An Approach for Privacy Enhanced Pixel-Level Image Processing in Hybrid Clouds. 1-8 - Fan Yang, Paul D. Amer, Nasif Ekiz:
A Scheduler for Multipath TCP. 1-7 - Ning Wang, Geoff V. Merrett, Robert G. Maunder, Alex Rogers:
Energy and Accuracy Trade-Offs in Accelerometry-Based Activity Recognition. 1-6 - Chien-An Chen, Myounggyu Won, Radu Stoleru, Geoffrey G. Xie:
Resource Allocation for Energy Efficient k-out-of-n System in Mobile Ad Hoc Networks. 1-9 - Liqiang Zhang:
DORA: Distributed Cognitive Random Access of Unslotted Markovian Channels under Tight Collision Constraints. 1-9 - Aizaz U. Chaudhry, John W. Chinneck, Roshdy H. M. Hafez:
Channel Requirements for Interference-Free Wireless Mesh Networks to Achieve Maximum Throughput. 1-7 - Zhiqiang Shi, Dan Ionescu, Dongli Zhang:
ST-XCP: A Stable XCP Protocol. 1-7 - Zhuo Liu, Bin Wang, Teng Wang, Yuan Tian, Cong Xu, Yandong Wang, Weikuan Yu, Carlos A. Cruz, Shujia Zhou, Tom Clune, Scott Klasky:
Profiling and Improving I/O Performance of a Large-Scale Climate Scientific Application. 1-7 - Debalina Ghosh, Prasant Mohapatra:
Resource Allocation in OFDMA Femto Networks. 1-5 - Dario G. Garao, Guido Maier, Achille Pattavina:
Modular EGS Architectures for Optical Interconnections. 1-7 - Lin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui-Hui Chiu, Seung-Jong Park:
AFCD: An Approximated-Fair and Controlled-Delay Queuing for High Speed Networks. 1-7 - C. Jasson Casey, Srivatsan Rajagopalan, Muxi Yan, Graham Booker, Alex Sprintson, Walt Magnussen:
Supporting Voice over LTE: Solutions, Architectures, and Protocols. 1-7 - Rodney Owens, Weichao Wang:
Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing. 1-5 - Maxim Schnjakin, Christoph Meinel:
Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. 1-9 - Zejiao Li, Xin Su, Jie Zeng, Yujun Kuang, Haijun Wang:
A Study of SNR Wall Phenomenon under Cooperative Energy Spectrum Sensing. 1-5 - Xuebin Ren, Xinyu Yang, Jie Lin, Qingyu Yang, Wei Yu:
On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems. 1-7 - Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Reachability Graph Based Hierarchical Test Generation for Network Protocols Modeled as Parallel Finite State Machines. 1-9 - Raoul Rivas, Ahsan Arefin, Klara Nahrstedt:
DECIMA: Virtualized I/O Management in 3D Teleimmersive Networks. 1-7 - M. Pandit, D. Yoon, J. Shen:
VSS: The Virtual Sensor System. 1-6 - Teng Jiang, Geoff V. Merrett, Nick R. Harris:
Opportunistic Direct Interconnection between Co-Located Wireless Sensor Networks. 1-5 - Yafeng Yin, Lei Xie, Sanglu Lu, Daoxu Chen:
Efficient Protocols for Rule Checking in RFID Systems. 1-7 - Tania Panayiotou, Georgios Ellinas, Neophytos Antoniades:
Hybrid Multicast Traffic Grooming in Transparent Optical Networks with Physical Layer Impairments. 1-6 - Yi Hong, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, Zhiming Ding:
Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor Networks. 1-9 - Hayang Kim, Hui Zang, Xiaoli Ma:
Analyzing and Modeling Temporal Patterns of Human Contacts in Cellular Networks. 1-7 - Zixiao Jia, Peng Zhang, Jiwei Huang, Chuang Lin, John C. S. Lui:
Modeling Hierarchical Caches in Content-Centric Networks. 1-7 - Paolo Valente:
Providing Near-Optimal Fair-Queueing Guarantees at Round-Robin Amortized Cost. 1-7 - Kang Chen, Haiying Shen, Karan Sapra, Guoxin Liu:
A Social Network Integrated Reputation System for Cooperative P2P File Sharing. 1-7 - Gul N. Khan, Guangyu Zhu:
Secure RFID Authentication Protocol with Key Updating Technique. 1-5 - Dariusz Koscielnik, Marek Miskowicz, Jakub Szyduczynski:
Upper Bounds on Unsuccessful Transmission Rate in Persistent and Non-Persistent CSMA Protocols. 1-5 - Huan Zhou, Huanyang Zheng, Jie Wu, Jiming Chen:
Energy-Efficient Contact Probing in Opportunistic Mobile Networks. 1-7 - Vangelis Gazis, Konstantinos Sasloglou, Nikolaos Frangiadakis, Panayotis Kikiras, Andreas Merentitis, Kostas Mathioudakis, Giorgos Mazarakis:
Architectural Blueprints of a Unified Sensing Platform for the Internet of Things. 1-5 - Young-Hyun Oh, David J. Thuente:
Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks. 1-9 - Hasen Nicanfar, Amr Alasaad, Peyman TalebiFard, Victor C. M. Leung:
Network Coding Based Encryption System for Advanced Metering Infrastructure. 1-7 - Liang Chen, Yipeng Zhou, Dah Ming Chiu:
Video Browsing - A Study of User Behavior in Online VoD Services. 1-7 - Xiulong Liu, Keqiu Li, Yanming Shen, Geyong Min, Bin Xiao, Wenyu Qu, Hongjuan Li:
A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems. 1-7 - Julinda Taylor, Bin Tang, Mehmet Bayram Yildirim:
Steady Status Study of Distributed Data Caching in Ad Hoc Networks. 1-6 - Saulo Henrique da Mata, Johann Max Hofmann Magalhaes, Alexandre Cardoso, Paulo Roberto Guardieiro, Helio A. Carvalho:
Performance Comparison of ENUM Name Servers. 1-5 - Sebastian Subik, Dennis Kaulbars, Patrick-Benjamin Bok, Christian Wietfeld:
Dynamic Link Classification Based on Neuronal Networks for QoS Enabled Access to Limited Resources. 1-5 - Haipeng Dai, Xiaobing Wu, Lijie Xu, Guihai Chen, Shan Lin:
Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running Forever. 1-7 - Jon R. Ward, Mohamed F. Younis:
On the Use of Distributed Beamforming to Increase Base Station Anonymity in Wireless Sensor Networks. 1-7 - Kien Nguyen, Quang Tran Minh, Shigeki Yamada:
A Software-Defined Networking Approach for Disaster-Resilient WANs. 1-5 - Dan Zhang, Hang Liu:
Routing and Name Resolution in Information-Centric Networks. 1-7 - Pritha Ghoshal, C. Jasson Casey, Paul V. Gratz, Alex Sprintson:
Stochastic Pre-Classification for Software Defined Firewalls. 1-8 - Francisco Airton Pereira da Silva, Paulo Anselmo da Mota Silveira Neto, Vinicius Cardoso Garcia, Fernando Antonio Mota Trinta, Rodrigo Elia Assad:
VeloZ: A Charging Policy Specification Language for Infrastructure Clouds. 1-7 - Xiaoshuang Wang, Sunil Agham, Vikram P. Munishwar, Vaibhav Nipunage, Shailendra Singh, Kartik Gopalan:
Transparent Network Protocol Testing and Evaluation. 1-7 - Honglong Chen, Wei Lou:
Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs. 1-7 - Peter Thai, Jaudelice Cavalcante de Oliveira:
Decoupling Policy from Routing with Software Defined Interdomain Management: Interdomain Routing for SDN-Based Networks. 1-6 - Joseph Gersch, Daniel Massey:
ROVER: Route Origin Verification Using DNS. 1-9 - Pan Yi, Hui Ding, Byrav Ramamurthy:
Budget-Minimized Resource Allocation and Task Scheduling in Distributed Grid/Clouds. 1-8 - Mohamad Jomaa, Khaleel W. Mershad, Noor Abbani, Yaman Sharaf-Dabbagh, Bashar Romanous, Hassan Artail, Mazen A. R. Saghir, Hazem M. Hajj, Haitham Akkary, Mariette Awad:
A Mediation Layer for Connecting Data-Intensive Applications to Reconfigurable Data Nodes. 1-9 - Bilal Zafar, Roman Alieiev, Liz Ribe-Baumann, Martin Haardt:
DHTs for Cluster-Based Ad-Hoc Networks Employing Multi-Hop Relaying. 1-6 - Jiayi Liu, Gwendal Simon:
Fast Near-Optimal Algorithm for Delivering Multiple Live Video Channels in CDNs. 1-7 - Hassan Noura, Steven Martin, Khaldoun Al Agha:
A New Efficient Secure Coding Scheme for Random Linear Network Coding. 1-7 - Marco Chiesa, Gabriele Lospoto, Massimo Rimondini, Giuseppe Di Battista:
Intra-Domain Pathlet Routing. 1-9 - Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named Data Networking. 1-7 - Konstantinos Liagkouras, Konstantinos Metaxiotis:
An Elitist Polynomial Mutation Operator for Improved Performance of MOEAs in Computer Networks. 1-5 - Lin Wang, Fa Zhang, Zhiyong Liu:
Improving the Network Energy Efficiency in MapReduce Systems. 1-7 - Yingxin Jiang, Shu Liu, Aaron Striegel:
Save for Later: A Technique for Improving End-to-End Mesh Network Performance. 1-6 - Noor Abbani, Hassan Artail:
Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop Modification. 1-9 - Jie Li, Jun Bi, Jianping Wu:
Towards a Cooperative Mechanism Based Distributed Source Address Filtering. 1-7 - Carol A. Niznik:
Games of Timing Theoretical Protocol Development and Performance Analysis for Missile Defense. 1-6 - Duong Nguyen-Huu, Thai Duong, Thinh P. Nguyen:
Fast Queuing Policies for Multimedia Applications. 1-6 - Jae-Pil Jeong, Wan-Seon Lim, Young-Joo Suh:
Throughput Enhancement for WDS-Based WLANs. 1-6 - Ankit Singh, A. L. Narasimha Reddy:
Multi Path PERT. 1-9 - Louise E. Moser, P. M. Melliar-Smith:
Probabilistic Analysis of Message Forwarding. 1-8 - Rafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira:
A Virtual Network Allocation Algorithm for Reliability Negotiation. 1-7 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin:
Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies. 1-8 - Xiruo Liu, Wade Trappe, Yanyong Zhang:
Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet. 1-7 - Baobao Zhang, Jun Bi, Yangyang Wang, Yu Zhang, Jianping Wu:
Refining IP-to-AS Mappings for AS-Level Traceroute. 1-7 - Péter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits:
Reliability Analysis of Wireless Real-Time Control Networks. 1-7 - Luca Bedogni, Angelo Trotta, Marco Di Felice, Luciano Bononi:
Machine-to-Machine Communication over TV White Spaces for Smart Metering Applications. 1-7 - Vitaliy Rapp, Kalman Graffi:
Continuous Gossip-Based Aggregation through Dynamic Information Aging. 1-7 - Shufeng Huang, James Griffioen:
Network Hypervisors: Managing the Emerging SDN Chaos. 1-7 - Abhishek Parakh, William Mahoney:
Privacy Preserving Computations Using Implicit Security. 1-6 - Shiguang Wang, Shaohan Hu, Shen Li, Hengchang Liu, Md. Yusuf Sarwar Uddin, Tarek F. Abdelzaher:
MINERVA: Information-Centric Programming for Social Sensing. 1-9 - Nauman Javed, Eric Lyons, Michael Zink, Tilman Wolf:
Adaptive Wireless Mesh Networks: Surviving Weather without Sensing It. 1-7 - Avi Zanko, Amir Leshem, Ephraim Zehavi:
Network Coding for Multicasting over Rayleigh Fading Multi Access Channels. 1-7 - Ahmet Can Babaoglu, Rudra Dutta:
A Verification Service Architecture for the Future Internet. 1-9 - Claudio A. Ardagna, Mauro Conti, Mario Leone, Julinda Stefa:
Preserving Smartphone Users' Anonymity in Cloudy Days. 1-5 - Declan T. Delaney, Lina Xu, Gregory M. P. O'Hare:
Spreading the Load in a Tree Type Routing Structure. 1-7 - Houssem Medhioub, Bilel Msekni, Djamal Zeghlache:
OCNI - Open Cloud Networking Interface. 1-8 - James P. G. Sterbenz, Prasad Kulkarni:
Diverse Infrastructure and Architecture for Datacenter and Cloud Resilience. 1-7 - Shraboni Jana, Amit Pande, An (Jack) Chan, Prasant Mohapatra:
Network Characterization and Perceptual Evaluation of Skype Mobile Videos. 1-7 - Umar Kalim, Mark K. Gardner, Eric J. Brown, Wu-chun Feng:
Seamless Migration of Virtual Machines across Networks. 1-7 - Stefan Braun, Massimo Monti, Manolis Sifalakis, Christian F. Tschudin:
An Empirical Study of Receiver-Based AIMD Flow-Control Strategies for CCN. 1-8 - Julius Mueller, Andreas Wierz, Dragos Vingarzan, Thomas Magedanz:
Elastic Network Design and Adaptive Flow Placement in Software Defined Networks. 1-6 - Marcos F. Caetano, Bruno F. Lourenço, Jacir Luiz Bordim:
On the Performance of the IEEE 802.11 in a Multi-Channel Environment. 1-7 - Xili Wan, Feng Shan, Xiaojun Shen:
An Optimal Algorithm for Time-Slot Assignment in SS/TDMA Satellite Systems. 1-6 - Mahdi Azarafrooz, Ramamurti Chandramouli, Koduvayur P. Subbalakshmi:
Reciprocity and Fairness in Medium Access Control Games. 1-5 - Nongda Hu, Dawei Wang, Zheng Cao, Xuejun An, Ninghui Sun:
Accelerating Allreduce Operation: A Switch-Based Solution. 1-8 - Andrew Blaich, Shu Liu, Aaron Striegel:
Re-Thinking 802.11 Rate Selection in the Face of Non-Altruistic Behavior. 1-6 - Hengky Susanto, Byung-Guk Kim:
Congestion Control with QoS and Delays Utility Function. 1-5 - Kaimin Wei, Deze Zeng, Song Guo, Ke Xu:
Social-Aware Relay Node Selection in Delay Tolerant Networks. 1-7 - Sandra Frei, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Generic Real-Time Traffic Distribution Framework: Black Rider. 1-8 - Yi Xu, Shiwen Mao:
Distributed Interference Alignment in Cognitive Radio Networks. 1-7 - Quan Jia, Kun Sun, Angelos Stavrou:
MOTAG: Moving Target Defense against Internet Denial of Service Attacks. 1-9 - Baris Tas, Ali Saman Tosun:
Controlled Path Traversal for a Mobile Element in Wireless Sensor Networks. 1-9 - Subharthi Paul, Raj Jain, Jianli Pan, Jay Iyer, David Oran:
OpenADN: A Case for Open Application Delivery Networking. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.