


default search action
22nd ICCCN 2013: Nassau, Bahamas
- 22nd International Conference on Computer Communication and Networks, ICCCN 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013. IEEE 2013, ISBN 978-1-4673-5774-6

- Wei Liu, E. K. Park:

e-Health AON (Application-Oriented Networks). 1-7 - Hao Wu, Jun Li, Yi Wang, Bin Liu:

EMC: The Effective Multi-Path Caching Scheme for Named Data Networking. 1-7 - Abhishek Dwaraki, Tilman Wolf:

Service Instantiation in an Internet with Choices. 1-7 - Ismail AlQerm

, Basem Shihada
, Kang G. Shin:
CogWnet: A Resource Management Architecture for Cognitive Wireless Networks. 1-7 - Matteo Varvello, Jairo O. Esteban, Mark Smith, Lloyd G. Greenwald, Yang Guo, Mary R. Schurgot:

Range Queries in MANET: Can Information-Centric Networking Help? 1-6 - Yang Guo, Lloyd G. Greenwald, Mary R. Schurgot, Matteo Varvello:

Performance Model for a Cache Enabled Content Distribution Framework over MANET. 1-8 - Xin Li, Jie Wu, Sanglu Lu:

QoS-Aware Service Selection in Geographically Distributed Clouds. 1-5 - Rehana Tabassum, Klara Nahrstedt, Edmond Rogers, King-Shan Lui:

SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication. 1-5 - Raul Landa, Richard G. Clegg

, João Taveira Araújo, Eleni Mykoniati, David Griffin, Miguel Rio:
Measuring the Relationships between Internet Geography and RTT. 1-7 - Mehrdad Khaledi, Alhussein A. Abouzeid

:
A Reserve Price Auction for Spectrum Sharing with Heterogeneous Channels. 1-7 - Wafa Ben Jaballah, Mauro Conti

, Mohamed Mosbah
, Claudio E. Palazzi
:
Secure Verification of Location Claims on a Vehicular Safety Application. 1-7 - José Vieira, Francisco Ganhão, Luís Bernardo

, Rui Dinis
, Marko Beko, Rodolfo Oliveira
, Paulo Pinto
:
Energy-Efficient QoS Provisioning in Random Access Satellite NDMA Schemes. 1-9 - Arash Nourian, Muthucumaru Maheswaran:

An Approach for Privacy Enhanced Pixel-Level Image Processing in Hybrid Clouds. 1-8 - Fan Yang, Paul D. Amer, Nasif Ekiz:

A Scheduler for Multipath TCP. 1-7 - Ning Wang, Geoff V. Merrett

, Robert G. Maunder
, Alex Rogers:
Energy and Accuracy Trade-Offs in Accelerometry-Based Activity Recognition. 1-6 - Chien-An Chen, Myounggyu Won, Radu Stoleru, Geoffrey G. Xie:

Resource Allocation for Energy Efficient k-out-of-n System in Mobile Ad Hoc Networks. 1-9 - Liqiang Zhang:

DORA: Distributed Cognitive Random Access of Unslotted Markovian Channels under Tight Collision Constraints. 1-9 - Aizaz U. Chaudhry

, John W. Chinneck, Roshdy H. M. Hafez:
Channel Requirements for Interference-Free Wireless Mesh Networks to Achieve Maximum Throughput. 1-7 - Zhiqiang Shi, Dan Ionescu, Dongli Zhang:

ST-XCP: A Stable XCP Protocol. 1-7 - Zhuo Liu, Bin Wang, Teng Wang, Yuan Tian, Cong Xu, Yandong Wang, Weikuan Yu

, Carlos A. Cruz, Shujia Zhou, Tom Clune, Scott Klasky:
Profiling and Improving I/O Performance of a Large-Scale Climate Scientific Application. 1-7 - Debalina Ghosh, Prasant Mohapatra:

Resource Allocation in OFDMA Femto Networks. 1-5 - Dario G. Garao, Guido Maier, Achille Pattavina:

Modular EGS Architectures for Optical Interconnections. 1-7 - Lin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui-Hui Chiu, Seung-Jong Park

:
AFCD: An Approximated-Fair and Controlled-Delay Queuing for High Speed Networks. 1-7 - C. Jasson Casey, Srivatsan Rajagopalan, Muxi Yan, Graham Booker, Alex Sprintson

, Walt Magnussen:
Supporting Voice over LTE: Solutions, Architectures, and Protocols. 1-7 - Rodney Owens, Weichao Wang:

Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing. 1-5 - Maxim Schnjakin, Christoph Meinel:

Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. 1-9 - Zejiao Li, Xin Su, Jie Zeng, Yujun Kuang, Haijun Wang:

A Study of SNR Wall Phenomenon under Cooperative Energy Spectrum Sensing. 1-5 - Xuebin Ren, Xinyu Yang, Jie Lin, Qingyu Yang, Wei Yu

:
On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems. 1-7 - Jiangyuan Yao

, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Reachability Graph Based Hierarchical Test Generation for Network Protocols Modeled as Parallel Finite State Machines. 1-9 - Raoul Rivas, Ahsan Arefin, Klara Nahrstedt:

DECIMA: Virtualized I/O Management in 3D Teleimmersive Networks. 1-7 - M. Pandit, D. Yoon, J. Shen:

VSS: The Virtual Sensor System. 1-6 - Teng Jiang, Geoff V. Merrett, Nick R. Harris:

Opportunistic Direct Interconnection between Co-Located Wireless Sensor Networks. 1-5 - Yafeng Yin, Lei Xie, Sanglu Lu, Daoxu Chen:

Efficient Protocols for Rule Checking in RFID Systems. 1-7 - Tania Panayiotou

, Georgios Ellinas
, Neophytos Antoniades:
Hybrid Multicast Traffic Grooming in Transparent Optical Networks with Physical Layer Impairments. 1-6 - Yi Hong, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, Zhiming Ding:

Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor Networks. 1-9 - Hayang Kim, Hui Zang, Xiaoli Ma:

Analyzing and Modeling Temporal Patterns of Human Contacts in Cellular Networks. 1-7 - Zixiao Jia, Peng Zhang, Jiwei Huang, Chuang Lin, John C. S. Lui:

Modeling Hierarchical Caches in Content-Centric Networks. 1-7 - Paolo Valente

:
Providing Near-Optimal Fair-Queueing Guarantees at Round-Robin Amortized Cost. 1-7 - Kang Chen, Haiying Shen, Karan Sapra, Guoxin Liu:

A Social Network Integrated Reputation System for Cooperative P2P File Sharing. 1-7 - Gul N. Khan

, Guangyu Zhu:
Secure RFID Authentication Protocol with Key Updating Technique. 1-5 - Dariusz Koscielnik, Marek Miskowicz, Jakub Szyduczynski:

Upper Bounds on Unsuccessful Transmission Rate in Persistent and Non-Persistent CSMA Protocols. 1-5 - Huan Zhou, Huanyang Zheng, Jie Wu, Jiming Chen:

Energy-Efficient Contact Probing in Opportunistic Mobile Networks. 1-7 - Vangelis Gazis

, Konstantinos Sasloglou, Nikolaos Frangiadakis, Panayotis Kikiras, Andreas Merentitis, Kostas Mathioudakis, Giorgos Mazarakis:
Architectural Blueprints of a Unified Sensing Platform for the Internet of Things. 1-5 - Young-Hyun Oh, David J. Thuente:

Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks. 1-9 - Hasen Nicanfar, Amr Alasaad, Peyman TalebiFard, Victor C. M. Leung

:
Network Coding Based Encryption System for Advanced Metering Infrastructure. 1-7 - Liang Chen, Yipeng Zhou

, Dah Ming Chiu:
Video Browsing - A Study of User Behavior in Online VoD Services. 1-7 - Xiulong Liu, Keqiu Li, Yanming Shen, Geyong Min, Bin Xiao

, Wenyu Qu, Hongjuan Li
:
A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems. 1-7 - Julinda Taylor, Bin Tang, Mehmet Bayram Yildirim

:
Steady Status Study of Distributed Data Caching in Ad Hoc Networks. 1-6 - Saulo Henrique da Mata, Johann Max Hofmann Magalhaes, Alexandre Cardoso

, Paulo Roberto Guardieiro, Helio A. Carvalho:
Performance Comparison of ENUM Name Servers. 1-5 - Sebastian Subik, Dennis Kaulbars, Patrick-Benjamin Bok, Christian Wietfeld

:
Dynamic Link Classification Based on Neuronal Networks for QoS Enabled Access to Limited Resources. 1-5 - Haipeng Dai

, Xiaobing Wu, Lijie Xu, Guihai Chen
, Shan Lin:
Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running Forever. 1-7 - Jon R. Ward, Mohamed F. Younis:

On the Use of Distributed Beamforming to Increase Base Station Anonymity in Wireless Sensor Networks. 1-7 - Kien Nguyen

, Quang Tran Minh, Shigeki Yamada:
A Software-Defined Networking Approach for Disaster-Resilient WANs. 1-5 - Dan Zhang, Hang Liu:

Routing and Name Resolution in Information-Centric Networks. 1-7 - Pritha Ghoshal, C. Jasson Casey, Paul V. Gratz

, Alex Sprintson
:
Stochastic Pre-Classification for Software Defined Firewalls. 1-8 - Francisco Airton Pereira da Silva, Paulo Anselmo da Mota Silveira Neto, Vinicius Cardoso Garcia

, Fernando Antonio Mota Trinta, Rodrigo Elia Assad:
VeloZ: A Charging Policy Specification Language for Infrastructure Clouds. 1-7 - Xiaoshuang Wang, Sunil Agham, Vikram P. Munishwar, Vaibhav Nipunage, Shailendra Singh, Kartik Gopalan

:
Transparent Network Protocol Testing and Evaluation. 1-7 - Honglong Chen, Wei Lou

:
Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs. 1-7 - Peter Thai, Jaudelice Cavalcante de Oliveira:

Decoupling Policy from Routing with Software Defined Interdomain Management: Interdomain Routing for SDN-Based Networks. 1-6 - Joseph Gersch, Daniel Massey:

ROVER: Route Origin Verification Using DNS. 1-9 - Pan Yi, Hui Ding, Byrav Ramamurthy:

Budget-Minimized Resource Allocation and Task Scheduling in Distributed Grid/Clouds. 1-8 - Mohamad Jomaa, Khaleel W. Mershad

, Noor Abbani, Yaman Sharaf-Dabbagh, Bashar Romanous, Hassan Artail, Mazen A. R. Saghir, Hazem M. Hajj, Haitham Akkary, Mariette Awad
:
A Mediation Layer for Connecting Data-Intensive Applications to Reconfigurable Data Nodes. 1-9 - Bilal Zafar, Roman Alieiev, Liz Ribe-Baumann, Martin Haardt:

DHTs for Cluster-Based Ad-Hoc Networks Employing Multi-Hop Relaying. 1-6 - Jiayi Liu, Gwendal Simon

:
Fast Near-Optimal Algorithm for Delivering Multiple Live Video Channels in CDNs. 1-7 - Hassan Noura

, Steven Martin, Khaldoun Al Agha:
A New Efficient Secure Coding Scheme for Random Linear Network Coding. 1-7 - Marco Chiesa

, Gabriele Lospoto
, Massimo Rimondini
, Giuseppe Di Battista
:
Intra-Domain Pathlet Routing. 1-9 - Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:

DoS and DDoS in Named Data Networking. 1-7 - Konstantinos Liagkouras

, Konstantinos Metaxiotis:
An Elitist Polynomial Mutation Operator for Improved Performance of MOEAs in Computer Networks. 1-5 - Lin Wang, Fa Zhang, Zhiyong Liu:

Improving the Network Energy Efficiency in MapReduce Systems. 1-7 - Yingxin Jiang, Shu Liu, Aaron Striegel

:
Save for Later: A Technique for Improving End-to-End Mesh Network Performance. 1-6 - Noor Abbani, Hassan Artail:

Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop Modification. 1-9 - Jie Li, Jun Bi

, Jianping Wu:
Towards a Cooperative Mechanism Based Distributed Source Address Filtering. 1-7 - Carol A. Niznik:

Games of Timing Theoretical Protocol Development and Performance Analysis for Missile Defense. 1-6 - Duong Nguyen-Huu, Thai Duong, Thinh P. Nguyen:

Fast Queuing Policies for Multimedia Applications. 1-6 - Jae-Pil Jeong, Wan-Seon Lim, Young-Joo Suh:

Throughput Enhancement for WDS-Based WLANs. 1-6 - Ankit Singh, A. L. Narasimha Reddy:

Multi Path PERT. 1-9 - Louise E. Moser, P. M. Melliar-Smith:

Probabilistic Analysis of Message Forwarding. 1-8 - Rafael L. Gomes

, Luiz F. Bittencourt, Edmundo R. M. Madeira
:
A Virtual Network Allocation Algorithm for Reliability Negotiation. 1-7 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori

, Artsiom Yautsiukhin
:
Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies. 1-8 - Xiruo Liu, Wade Trappe, Yanyong Zhang:

Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet. 1-7 - Baobao Zhang, Jun Bi, Yangyang Wang, Yu Zhang, Jianping Wu:

Refining IP-to-AS Mappings for AS-Level Traceroute. 1-7 - Péter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits:

Reliability Analysis of Wireless Real-Time Control Networks. 1-7 - Luca Bedogni

, Angelo Trotta
, Marco Di Felice, Luciano Bononi
:
Machine-to-Machine Communication over TV White Spaces for Smart Metering Applications. 1-7 - Vitaliy Rapp, Kalman Graffi

:
Continuous Gossip-Based Aggregation through Dynamic Information Aging. 1-7 - Shufeng Huang, James Griffioen:

Network Hypervisors: Managing the Emerging SDN Chaos. 1-7 - Abhishek Parakh, William Mahoney

:
Privacy Preserving Computations Using Implicit Security. 1-6 - Shiguang Wang, Shaohan Hu, Shen Li, Hengchang Liu, Md. Yusuf Sarwar Uddin

, Tarek F. Abdelzaher:
MINERVA: Information-Centric Programming for Social Sensing. 1-9 - Nauman Javed, Eric Lyons, Michael Zink

, Tilman Wolf:
Adaptive Wireless Mesh Networks: Surviving Weather without Sensing It. 1-7 - Avi Zanko, Amir Leshem

, Ephraim Zehavi
:
Network Coding for Multicasting over Rayleigh Fading Multi Access Channels. 1-7 - Ahmet Can Babaoglu, Rudra Dutta:

A Verification Service Architecture for the Future Internet. 1-9 - Claudio A. Ardagna

, Mauro Conti
, Mario Leone, Julinda Stefa
:
Preserving Smartphone Users' Anonymity in Cloudy Days. 1-5 - Declan T. Delaney

, Lina Xu, Gregory M. P. O'Hare
:
Spreading the Load in a Tree Type Routing Structure. 1-7 - Houssem Medhioub, Bilel Msekni, Djamal Zeghlache

:
OCNI - Open Cloud Networking Interface. 1-8 - James P. G. Sterbenz, Prasad A. Kulkarni:

Diverse Infrastructure and Architecture for Datacenter and Cloud Resilience. 1-7 - Shraboni Jana, Amit Pande, An (Jack) Chan, Prasant Mohapatra:

Network Characterization and Perceptual Evaluation of Skype Mobile Videos. 1-7 - Umar Kalim, Mark K. Gardner, Eric J. Brown, Wu-chun Feng:

Seamless Migration of Virtual Machines across Networks. 1-7 - Stefan Braun, Massimo Monti, Manolis Sifalakis

, Christian F. Tschudin:
An Empirical Study of Receiver-Based AIMD Flow-Control Strategies for CCN. 1-8 - Julius Mueller, Andreas Wierz, Dragos Vingarzan, Thomas Magedanz:

Elastic Network Design and Adaptive Flow Placement in Software Defined Networks. 1-6 - Marcos F. Caetano

, Bruno F. Lourenço, Jacir Luiz Bordim:
On the Performance of the IEEE 802.11 in a Multi-Channel Environment. 1-7 - Xili Wan, Feng Shan, Xiaojun Shen:

An Optimal Algorithm for Time-Slot Assignment in SS/TDMA Satellite Systems. 1-6 - Mahdi Azarafrooz, Ramamurti Chandramouli, Koduvayur P. Subbalakshmi

:
Reciprocity and Fairness in Medium Access Control Games. 1-5 - Nongda Hu, Dawei Wang, Zheng Cao

, Xuejun An, Ninghui Sun:
Accelerating Allreduce Operation: A Switch-Based Solution. 1-8 - Andrew Blaich, Shu Liu, Aaron Striegel

:
Re-Thinking 802.11 Rate Selection in the Face of Non-Altruistic Behavior. 1-6 - Hengky Susanto, Byung-Guk Kim:

Congestion Control with QoS and Delays Utility Function. 1-5 - Kaimin Wei, Deze Zeng, Song Guo

, Ke Xu:
Social-Aware Relay Node Selection in Delay Tolerant Networks. 1-7 - Sandra Frei, Woldemar F. Fuhrmann, Bogdan V. Ghita

:
Generic Real-Time Traffic Distribution Framework: Black Rider. 1-8 - Yi Xu, Shiwen Mao:

Distributed Interference Alignment in Cognitive Radio Networks. 1-7 - Quan Jia, Kun Sun, Angelos Stavrou

:
MOTAG: Moving Target Defense against Internet Denial of Service Attacks. 1-9 - Baris Tas, Ali Saman Tosun:

Controlled Path Traversal for a Mobile Element in Wireless Sensor Networks. 1-9 - Subharthi Paul, Raj Jain

, Jianli Pan, Jay Iyer, David Oran:
OpenADN: A Case for Open Application Delivery Networking. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














