Research challenges towards the Future Internet
暂无分享,去创建一个
Serge Fdida | Petri Mähönen | Moshe Zukerman | Weijia Jia | Steve Uhlig | Marco Conti | Ying-Dar Lin | Martin Maier | Refik Molva | Song Chong | Holger Karl | S. Uhlig | H. Karl | M. Zukerman | M. Conti | S. Chong | R. Molva | P. Mähönen | M. Maier | W. Jia | S. Fdida | Ying-Dar Lin
[1] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[2] Marianne Winslett,et al. Secure aggregation in a publish-subscribe system , 2008, WPES '08.
[3] Xiaodong Wang,et al. Coordinated Scheduling and Power Allocation in Downlink Multicell OFDMA Networks , 2009, IEEE Transactions on Vehicular Technology.
[4] Andrew T. Campbell,et al. Fast track article: Bubble-sensing: Binding sensing tasks to the physical world , 2010 .
[5] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[6] M. Hansen,et al. Participatory Sensing , 2019, Internet of Things.
[7] Reza Curtmola,et al. Secure network coding for wireless mesh networks: Threats, challenges, and directions , 2009, Comput. Commun..
[8] Andrea Passarella,et al. HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships , 2010, Comput. Commun..
[9] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, NBiS.
[10] Yu Wang,et al. Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.
[11] Zheng Wang,et al. Internet traffic engineering without full mesh overlaying , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[12] Marco Conti,et al. Autonomic detection of dynamic social communities in Opportunistic Networks , 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop.
[13] Refik Molva,et al. Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..
[14] Marco Mellia,et al. Energy-Aware Networks: Reducing Power Consumption By Switching Off Network Elements (invited paper) , 2008 .
[15] Mikkel Thorup,et al. Optimizing OSPF/IS-IS weights in a changing world , 2002, IEEE J. Sel. Areas Commun..
[16] Larry Peterson,et al. Inter-AS traffic patterns and their implications , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[17] Dharma P. Agrawal,et al. Mobile Ad hoc Networking , 2002 .
[18] Giuseppe Anastasi,et al. A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks , 2011, IEEE Transactions on Industrial Informatics.
[19] Brian D. Davison,et al. Performance comparison of different multicast routing strategies in disruption tolerant networks , 2009, Comput. Commun..
[20] K DasSajal,et al. QoS-aware data reporting control in cluster-based wireless sensor networks , 2010 .
[21] Weijia Jia,et al. Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[22] Deniz Gündüz,et al. Source and Channel Coding for Cooperative Relaying , 2005, IEEE Transactions on Information Theory.
[23] Thierry Turletti,et al. Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations , 2009, IEEE Transactions on Mobile Computing.
[24] Jie Gao,et al. Moving beyond end-to-end path information to optimize CDN performance , 2009, IMC '09.
[25] Robert Cole,et al. Computer Communications , 1982, Springer New York.
[26] Farnam Jahanian,et al. Internet routing instability , 1997, SIGCOMM '97.
[27] Tomas Olovsson,et al. Passive internet measurement: Overview and guidelines based on experiences , 2010, Comput. Commun..
[28] Joseph Mitola,et al. Cognitive Radio Architecture: The Engineering Foundations of Radio XML , 2006 .
[29] Rodney S. Tucker,et al. The future Internet - An energy consumption perspective , 2009, 2009 14th OptoElectronics and Communications Conference.
[30] Sidi-Mohammed Senouci,et al. A Cooperative Low Power Mac Protocol for Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[31] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[32] Moshe Zukerman,et al. Optimizing multi-layered networks towards a transparently optical internet , 2010, 2010 12th International Conference on Transparent Optical Networks.
[33] Yung Yi,et al. Practical dynamic interference management in multi-carrier multi-cell wireless networks: A reference user based approach , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[34] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[35] L. Chiaraviglio,et al. Optimal Energy Savings in Cellular Access Networks , 2009, 2009 IEEE International Conference on Communications Workshops.
[36] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[37] Marco Conti,et al. Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution , 2008, Pervasive Mob. Comput..
[38] Pedro Merino,et al. QoS analysis of video streaming service in live cellular networks , 2010, Comput. Commun..
[39] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[40] Jörg Ott,et al. Drive-thru Internet: IEEE 802.11b for "automobile" users , 2004, IEEE INFOCOM 2004.
[41] Dan Forsberg,et al. LTE key management analysis with session keys context , 2010, Comput. Commun..
[42] R.S. Tucker,et al. Energy Consumption in Optical IP Networks , 2009, Journal of Lightwave Technology.
[43] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[44] Larry L. Constantine,et al. Back to the future , 2001, CACM.
[45] Eytan Modiano,et al. Fairness and Optimal Stochastic Control for Heterogeneous Networks , 2005, IEEE/ACM Transactions on Networking.
[46] Mihaela Cardei,et al. Improving network lifetime with mobile wireless sensor networks , 2010, Comput. Commun..
[47] Oliver W. W. Yang,et al. Vehicular telematics over heterogeneous wireless networks: A survey , 2010, Comput. Commun..
[48] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[49] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[50] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[51] William G. Griswold,et al. Peopletones: a system for the detection and notification of buddy proximity on mobile phones , 2008, MobiSys '08.
[52] Adel Javanmard,et al. Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations , 2009, Comput. Commun..
[53] Jean-Yves Le Boudec,et al. Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010, IEEE Trans. Mob. Comput..
[54] Keith W. Ross,et al. Measuring and Evaluating Large-Scale CDNs , 2008 .
[55] Nirvana Meratnia,et al. A directional data dissemination protocol for vehicular environments , 2011, Comput. Commun..
[56] Marco Di Felice,et al. SEARCH: A routing protocol for mobile cognitive radio ad-Hoc networks , 2009, 2009 IEEE Sarnoff Symposium.
[57] Anja Feldmann,et al. Improving content delivery using provider-aided distance information , 2010, IMC '10.
[58] Richard G. Clegg,et al. A critical look at power law modelling of the Internet , 2009, Comput. Commun..
[59] Byung-Gon Chun,et al. Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.
[60] Baochun Li,et al. XOR-Assisted Cooperative Diversity in OFDMA Wireless Networks: Optimization Framework and Approximation Algorithms , 2009, IEEE INFOCOM 2009.
[61] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[62] Raffaele Bruno,et al. Survey on diversity-based routing in wireless mesh networks: Challenges and solutions , 2010, Comput. Commun..
[63] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[64] Elza Erkip,et al. Increasing uplink capacity via user cooperation diversity , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[65] Paul E. Green. Fiber to the Home: The New Empowerment , 2005 .
[66] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[67] Weijia Jia,et al. Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[68] Ajmone Marsan,et al. [IEEE 2009 IEEE International Conference on Communications Workshops - Dresden, Germany (2009.06.14-2009.06.18)] 2009 IEEE International Conference on Communications Workshops - Optimal Energy Savings in Cellular Access Networks , 2009 .
[69] Marco Conti,et al. Throughput and Fairness Analysis of 802.11-Based Vehicle-to-Infrastructure Data Transfers , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[70] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[71] Martin Maier,et al. Fiber-wireless (FiWi) access networks: Challenges and opportunities , 2011, IEEE Network.
[72] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[73] Weijia Jia,et al. Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications , 2011, 2011 31st International Conference on Distributed Computing Systems.
[74] Leandros Tassiulas,et al. Linear complexity algorithms for maximum throughput in radio networks and input queued switches , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[75] Devavrat Shah,et al. Distributed algorithm and reversible network , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[76] Lachlan L. H. Andrew,et al. Dynamic Right-Sizing for Power-Proportional Data Centers , 2011, IEEE/ACM Transactions on Networking.
[77] Refik Molva,et al. Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[78] Nick McKeown,et al. Optical Packet Buffers for Backbone Internet Routers , 2010, IEEE/ACM Transactions on Networking.
[79] Prasant Mohapatra,et al. Comparing simulation tools and experimental testbeds for wireless mesh networks , 2011, Pervasive Mob. Comput..
[80] Martin Reisslein,et al. The Audacity of Fiber-Wireless (FiWi) Networks (Invited Paper) , 2009 .
[81] David Sandham,et al. Into the darkness - [comms fibre networks] , 2009 .
[82] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[83] J E Simsarian,et al. Architectures, Components, and Subsystems for Future Optical Packet Switches , 2010, IEEE Journal of Selected Topics in Quantum Electronics.
[84] Chiara Orsini,et al. C Consiglio Nazionale delle Ricerche The Impact of IXPs on the AS-level Topology Structure of the Internet , 2010 .
[85] Michael J. Demmer,et al. The design and implementation of a session layer for delay-tolerant networks , 2009, Comput. Commun..
[86] Randy H. Katz,et al. Characterizing the Internet hierarchy from multiple vantage points , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[87] Michael Rabinovich,et al. Content Delivery Networks: Protection or Threat? , 2009, ESORICS.
[88] Marco Conti,et al. Characterising Aggregate Inter-contact Times in Heterogeneous Opportunistic Networks , 2011, Networking.
[89] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[90] Tracy Camp,et al. Trace-based mobility modeling for multi-hop wireless networks , 2011, Comput. Commun..
[91] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[92] Kevin C. Almeroth,et al. DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity , 2009, Comput. Commun..
[93] Sergiu Nedevschi,et al. Reducing Network Energy Consumption via Sleeping and Rate-Adaptation , 2008, NSDI.
[94] Ness B. Shroff,et al. Joint Congestion Control and Distributed Scheduling for Throughput Guarantees in Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[95] Raj Jain,et al. Architectures for the future networks and the next generation Internet: A survey , 2011, Comput. Commun..
[96] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[97] Hongseok Yoo,et al. Repetition-based cooperative broadcasting for vehicular ad-hoc networks , 2011, Comput. Commun..
[98] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[99] Jörg Ott,et al. Controlling resource hogs in mobile delay-tolerant networks , 2010, Comput. Commun..
[100] Weijia Jia,et al. DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains , 2013, IEEE Transactions on Mobile Computing.
[101] Marco Conti,et al. Multihop Ad Hoc Networking: The Reality , 2007, IEEE Communications Magazine.
[102] Guobin Shen,et al. MobiUS: enable together-viewing video experience across two mobile devices , 2007, MobiSys '07.
[103] Mark Billinghurst,et al. Face to face collaborative AR on mobile phones , 2005, Fourth IEEE and ACM International Symposium on Mixed and Augmented Reality (ISMAR'05).
[104] Marco Conti,et al. Load-aware routing in mesh networks: Models, algorithms and experimentation , 2011, Comput. Commun..
[105] Leandros Tassiulas,et al. Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks , 1992 .
[106] Xu Li,et al. A new paradigm for urban surveillance with vehicular sensor networks , 2011, Comput. Commun..
[107] Marco Conti,et al. Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.
[108] Martin Reisslein,et al. Trends in Optical Switching Techniques: A Short Survey , 2008, IEEE Network.
[109] Hannes Frey,et al. Fading-resistant low-latency broadcasts in wireless multihop networks: the probabilistic cooperation diversity approach , 2010, MobiHoc '10.
[110] Christian Bonnet,et al. Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.
[111] Ioannis Psaras,et al. Deep-Space Transport Protocol: A novel transport scheme for Space DTNs , 2009, Comput. Commun..
[112] Danilo De Donno,et al. Deploying multiple interconnected gateways in heterogeneous wireless sensor networks: An optimization approach , 2010, Comput. Commun..
[113] Per Ödling,et al. The fourth generation broadband concept , 2009, IEEE Communications Magazine.
[114] Alexander L. Stolyar,et al. Maximizing Queueing Network Utility Subject to Stability: Greedy Primal-Dual Algorithm , 2005, Queueing Syst. Theory Appl..
[115] Pasi Ojala,et al. Media coding for the next generation mobile system LTE , 2010, Comput. Commun..
[116] Christopher Krügel,et al. Identifying Dormant Functionality in Malware Programs , 2010, 2010 IEEE Symposium on Security and Privacy.
[117] Ellen W. Zegura,et al. Message ferries as generalized dominating sets in intermittently connected mobile networks , 2010, MobiOpp '10.
[118] Jiann-Liang Chen,et al. Android/OSGi-based vehicular network management system , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[119] L.G. Roberts. A radical new router , 2009, IEEE Spectrum.
[120] Marco Conti,et al. Routing Internet traffic in heterogeneous mesh networks: Analysis and algorithms , 2011, Perform. Evaluation.
[121] Kevin C. Almeroth,et al. On the implications of routing metric staleness in delay tolerant networks , 2009, Comput. Commun..
[122] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[123] Clint Schow,et al. Get On The Optical Bus , 2010, IEEE Spectrum.
[124] Wen Hu,et al. Preserving privacy in participatory sensing systems , 2010, Comput. Commun..
[125] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[126] Mario Di Francesco,et al. Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.
[127] Franco Davoli,et al. Energy Efficiency in the Future Internet: A Survey of Existing Approaches and Trends in Energy-Aware Fixed Network Infrastructures , 2011, IEEE Communications Surveys & Tutorials.
[128] Carlo Contavalli,et al. Client IP information in DNS requests , 2010 .
[129] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[130] Abhijit Bose,et al. Delayed internet routing convergence , 2000, SIGCOMM.
[131] Refik Molva,et al. Privacy-Preserving Content-Based Publish/Subscribe Networks , 2009, SEC.
[132] Jörg Ott,et al. Special issue of computer communications on delay and disruption tolerant networking , 2009, Computer Communications.
[133] Martin Reisslein,et al. The Audacity of Fiber-Wireless (FiWi) Networks , 2008, AccessNets.
[134] Roberto Rojas-Cessa,et al. Task-execution scheduling schemes for network measurement and monitoring , 2010, Comput. Commun..
[135] Olav Tirkkonen,et al. LTE, the radio technology path towards 4G , 2010, Comput. Commun..
[136] Paul Vixie,et al. What DNS is not , 2009, Commun. ACM.
[137] Ryan W. Thomas,et al. Cognitive networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[138] FroehlichJon,et al. Fast track article , 2012 .
[139] Volker Springel. Into the darkness , 2007, Nature.
[140] Keri Schreiner. Where We At? Mobile Phones Bring GPS to the Masses , 2007, IEEE Computer Graphics and Applications.
[141] H. Vincent Poor,et al. Towards utility-optimal random access without message passing , 2010, Wirel. Commun. Mob. Comput..
[142] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[143] Didier Colle,et al. Power reduction techniques in multilayer traffic engineering , 2009, 2009 11th International Conference on Transparent Optical Networks.
[144] Michael Weber,et al. Measuring long-term location privacy in vehicular communication systems , 2010, Comput. Commun..
[145] George C. Polyzos,et al. Review of some fundamental approaches for power control in wireless networks , 2011, Comput. Commun..
[146] Ying Li,et al. DaVinci: dynamically adaptive virtual networks for a customized internet , 2008, CoNEXT '08.
[147] Vinton G. Cerf,et al. Delay-Tolerant Networking Architecture , 2007, RFC.
[148] Sunghyun Choi,et al. Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks , 2009, Comput. Commun..
[149] Qinghua Li,et al. Multicasting in delay tolerant networks: a social network perspective , 2009, MobiHoc '09.
[150] Katerina J. Argyraki,et al. RouteBricks: exploiting parallelism to scale software routers , 2009, SOSP '09.
[151] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[152] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[153] R S Tucker,et al. Green Optical Communications—Part II: Energy Limitations in Networks , 2011, IEEE Journal of Selected Topics in Quantum Electronics.
[154] Mooi Choo Chuah,et al. An encounter-based multicast scheme for disruption tolerant networks , 2009, Comput. Commun..
[155] Fikret Sivrikaya,et al. Time synchronization in sensor networks: a survey , 2004, IEEE Network.
[156] Marco Conti,et al. Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.
[157] Jinsung Lee,et al. Implementing utility-optimal CSMA , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[158] Claudio Casetti,et al. Planning roadside infrastructure for information dissemination in intelligent transportation systems , 2010, Comput. Commun..
[159] Moshe Zukerman,et al. Commentary: back to the future , 2009 .
[160] Roberto Di Pietro,et al. Location privacy and resilience in wireless sensor networks querying , 2011, Comput. Commun..
[161] David Grace,et al. Use of aerial platforms for energy efficient medium access control in wireless sensor networks , 2010, Comput. Commun..
[162] Balachander Krishnamurthy,et al. A Socratic method for validation of measurement-based networking research , 2011, Comput. Commun..
[163] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[164] Mark Handley,et al. XORP: an open platform for network research , 2003, CCRV.
[165] Juan-Carlos Cano,et al. An overview of vertical handover techniques: Algorithms, protocols and tools , 2011, Comput. Commun..
[166] Alhussein A. Abouzeid,et al. Connectivity in time-graphs , 2011, Pervasive Mob. Comput..
[167] Panganamala Ramana Kumar,et al. A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.
[168] C.-C. Jay Kuo,et al. Cooperative Communications and Networking , 2010 .
[169] Sajal K. Das,et al. Coverage and connectivity issues in wireless sensor networks: A survey , 2008, Pervasive Mob. Comput..
[170] Marco Conti,et al. From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.
[171] Jennifer Rexford,et al. Future Internet architecture , 2010, Commun. ACM.
[172] Z. Li,et al. IEEE 802.16: History, status and future trends , 2010, Comput. Commun..
[173] Sajal K. Das,et al. QoS-aware data reporting control in cluster-based wireless sensor networks , 2010, Comput. Commun..
[174] Di Ma,et al. A survey of movement strategies for improving network coverage in wireless sensor networks , 2009, Comput. Commun..
[175] Frank Thomson Leighton,et al. Improving performance on the internet , 2008, CACM.
[176] Chris Kanich,et al. Spamcraft: An Inside Look At Spam Campaign Orchestration , 2009, LEET.
[177] Marco Conti,et al. Multihop Ad Hoc Networking: The Theory , 2007, IEEE Communications Magazine.
[178] Valtteri Niemi. Editorial for the LTE special section , 2010, Comput. Commun..
[179] Rodney S. Tucker,et al. Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport , 2011, Proceedings of the IEEE.
[180] Xuemin Shen,et al. OFDMA Based Two-Hop Cooperative Relay Network Resources Allocation , 2008, 2008 IEEE International Conference on Communications.
[181] Li Xiao,et al. Channel allocation in multi-channel wireless mesh networks , 2011, Comput. Commun..
[182] Rui Zhang,et al. PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[183] Ratul Mahajan,et al. Understanding BGP misconfiguration , 2002, SIGCOMM 2002.
[184] William Webb. Wireless Communications: The Future , 2007 .
[185] R.S. Tucker,et al. Evolution of WDM Optical IP Networks: A Cost and Energy Perspective , 2009, Journal of Lightwave Technology.
[186] Kemal Akkaya,et al. Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks , 2009, Comput. Commun..
[187] Mikkel Thorup,et al. Internet traffic engineering by optimizing OSPF weights , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[188] Ellen W. Zegura,et al. Hierarchical power management in disruption tolerant networks using traffic-aware optimization , 2009, Comput. Commun..
[189] Mamoru Sawahashi,et al. Coordinated multipoint transmission/reception techniques for LTE-advanced [Coordinated and Distributed MIMO] , 2010, IEEE Wireless Communications.
[190] R. Wilder,et al. Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..
[191] Y. Ofek,et al. Time for a "Greener" Internet , 2009, 2009 IEEE International Conference on Communications Workshops.
[192] Sajal K. Das,et al. Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey , 2011, TOSN.
[193] Marco Conti,et al. Human mobility models for opportunistic networks , 2011, IEEE Communications Magazine.
[194] Franco Zambonelli,et al. Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence , 2012, Pervasive Mob. Comput..
[195] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[196] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[197] John Murphy,et al. Using cross-layer metrics to improve the performance of end-to-end handover mechanisms , 2009, Comput. Commun..
[198] Robert Tappan Morris,et al. DNS performance and the effectiveness of caching , 2001, IMW '01.
[199] Mehmet C. Vuran,et al. Special issue of "Computer Communications" on Cognitive Radio and Dynamic Spectrum Sharing Systems , 2009, Comput. Commun..
[200] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[201] Balachander Krishnamurthy,et al. On the use and performance of content distribution networks , 2001, IMW '01.
[202] George C. Polyzos,et al. Traffic characteristics of the T1 NSFNET backbone , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.
[203] Bahador Bakhshi,et al. On-line joint QoS routing and channel assignment in multi-channel multi-radio wireless mesh networks , 2011, Comput. Commun..
[204] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[205] Marco Mellia,et al. Energy aware Networks: Reducing Power Consumption by Switching Off Network Portions , 2008 .
[206] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[207] Cem Ersoy,et al. MAC protocols for wireless sensor networks: a survey , 2006, IEEE Communications Magazine.
[208] Tzi-cker Chiueh,et al. A Study of the Packer Problem and Its Solutions , 2008, RAID.
[209] Ian F. Akyildiz,et al. Wireless underground sensor networks: Research challenges , 2006, Ad Hoc Networks.
[210] Ellen W. Zegura,et al. Message ferries as generalized dominating sets in intermittently connected mobile networks , 2011, Pervasive Mob. Comput..
[211] Marco Conti,et al. Design and performance evaluation of ContentPlace, a social-aware data dissemination system for opportunistic networks , 2010, Comput. Networks.
[212] Ajay D. Kshemkalyani,et al. Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.
[213] VojnovicMilan,et al. Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010 .
[214] Michele Zorzi,et al. Protocol design issues in underwater acoustic networks , 2011, Comput. Commun..
[215] M. Medard,et al. Design and Analysis of Optical Flow-Switched Networks , 2009, IEEE/OSA Journal of Optical Communications and Networking.
[216] Jin Li,et al. Measuring and evaluating large-scale CDNs Paper withdrawn at Mirosoft's request , 2008, IMC '08.
[217] Miguel A. Labrador,et al. On the applicability of available bandwidth estimation techniques and tools , 2010, Comput. Commun..
[218] Janne Riihijärvi,et al. Cognitive Wireless Networks : Your Network Just Became a Teenager , 2006 .
[219] Ozan K. Tonguz,et al. Broadcast storm mitigation techniques in vehicular ad hoc networks , 2007, IEEE Wireless Communications.
[220] Farnam Jahanian,et al. Internet inter-domain traffic , 2010, SIGCOMM '10.
[221] Christophe Diot,et al. Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.
[222] Yuan-Cheng Lai,et al. Hardware-Software Codesign for High-Speed Signature-based Virus Scanning , 2009, IEEE Micro.
[223] A Coiro,et al. Reducing Power Consumption in Wavelength Routed Networks by Selective Switch Off of Optical Links , 2011, IEEE Journal of Selected Topics in Quantum Electronics.
[224] Jie Wu,et al. Survey on anonymous communications in computer networks , 2010, Comput. Commun..
[225] Wolfgang Mühlbauer,et al. Comparing DNS resolvers in the wild , 2010, IMC '10.
[226] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[227] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[228] B. Mukherjee,et al. Hybrid Wireless-Optical Broadband-Access Network (WOBAN): A Review of Relevant Challenges , 2007, Journal of Lightwave Technology.
[229] Gordon T. Wilfong,et al. An analysis of BGP convergence properties , 1999, SIGCOMM '99.
[230] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[231] R. Srikant,et al. Joint congestion control, routing, and MAC for stability and fairness in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[232] Jeffrey G. Andrews,et al. A primer on spatial modeling and analysis in wireless networks , 2010, IEEE Communications Magazine.
[233] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[234] Marco Conti,et al. Data dissemination in opportunistic networks using cognitive heuristics , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[235] Mark Handley,et al. Towards high performance virtual routers on commodity hardware , 2008, CoNEXT '08.
[236] Junichi Kani,et al. Next-generation PON-part I: Technology roadmap and general requirements , 2009, IEEE Communications Magazine.
[237] AtiquzzamanMohammed,et al. Using cross-layer metrics to improve the performance of end-to-end handover mechanisms , 2009 .
[238] Cecilia Mascolo,et al. Designing mobility models based on social network theory , 2007, MOCO.
[239] Joseph Mitola. Aware, Adaptive and Cognitive Radio: The Engineering Foundations of Radio XML , 2006 .
[240] Stefan Valentin,et al. When Do Cooperative Networks Profit from CSI Feedback? - An Outage Capacity Perspective , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[241] Joseph Mitola. An Integrated Agent Architecture for Software Defined Radio , 2000 .
[242] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[243] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[244] Biswanath Mukherjee,et al. Greening the Optical Backbone Network: A Traffic Engineering Approach , 2010, 2010 IEEE International Conference on Communications.
[245] Jean C. Walrand,et al. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks , 2010, IEEE/ACM Transactions on Networking.
[246] Marco Conti,et al. Modelling Social-Aware Forwarding in Opportunistic Networks , 2010, PERFORM.
[247] Mark H. Hansen,et al. Urban sensing: out of the woods , 2008, CACM.
[248] Peter I. Corke,et al. ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks , 2009, Comput. Commun..
[249] Prasant Mohapatra,et al. Comparing simulation tools and experimental testbeds for wireless mesh networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).