No abstract available.
Cited By
- Arasteh E and Dömer R (2024). Fast Loosely-Timed Deep Neural Network Models with Accurate Memory Contention, ACM Transactions on Embedded Computing Systems, 23:5, (1-32), Online publication date: 30-Sep-2024.
- Beránek J, Böhm S and Cima V (2022). Analysis of workflow schedulers in simulated distributed environments, The Journal of Supercomputing, 78:13, (15154-15180), Online publication date: 1-Sep-2022.
- Camilli M and Russo B (2022). Modeling Performance of Microservices Systems with Growth Theory, Empirical Software Engineering, 27:2, Online publication date: 1-Mar-2022.
- Namjoonia F, Sheikhi M and Hakami V (2022). Fast reinforcement learning algorithms for joint adaptive source coding and transmission control in IoT devices with renewable energy storage, Neural Computing and Applications, 34:5, (3959-3979), Online publication date: 1-Mar-2022.
- Slack D, Hilgard S, Lakkaraju H and Singh S Counterfactual explanations can be manipulated Proceedings of the 35th International Conference on Neural Information Processing Systems, (62-75)
- Haverkort B Performance Evaluation: Model-Driven or Problem-Driven? Quantitative Evaluation of Systems, (3-11)
- Avritzer A, Britto R, Trubiani C, Russo B, Janes A, Camilli M, van Hoorn A, Heinrich R, Rapp M and Henß J A Multivariate Characterization and Detection of Software Performance Antipatterns Proceedings of the ACM/SPEC International Conference on Performance Engineering, (61-72)
- Laitrakun S (2021). Collision-aware distributed detection with population-splitting algorithms, EURASIP Journal on Wireless Communications and Networking, 2021:1, Online publication date: 29-Mar-2021.
- Mandal P PCRF: On the blocking probability of LTE-A 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), (1-4)
- Chen Z, Gu Z and Wang Y Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System? Wireless Algorithms, Systems, and Applications, (51-64)
- Basak S and Acharya T (2018). Spectrum-aware outage minimizing cooperative routing in cognitive radio sensor networks, Wireless Networks, 26:2, (1069-1084), Online publication date: 1-Feb-2020.
- Chisci G, Conti A, Mucchi L and Win M (2019). Intrinsic Secrecy in Inhomogeneous Stochastic Networks, IEEE/ACM Transactions on Networking, 27:4, (1291-1304), Online publication date: 1-Aug-2019.
- Talak R, Karaman S and Modiano E When a Heavy Tailed Service Minimizes Age of Information 2019 IEEE International Symposium on Information Theory (ISIT), (345-349)
- Gravey A, Amar D, Gravey P and Morvan M (2019). An optical packet metro architecture for Fixed Mobile Convergence in the cloud era, Photonic Network Communications, 37:3, (278-295), Online publication date: 1-Jun-2019.
- Apte V "What Did I learn In Performance Analysis last year?" Companion of the 2019 ACM/SPEC International Conference on Performance Engineering, (71-77)
- Xu T, Botelho L and Lin F VStore Proceedings of the Fourteenth EuroSys Conference 2019, (1-17)
- Poojary S and Sharma V (2019). An asymptotic approximation for TCP CUBIC, Queueing Systems: Theory and Applications, 91:1-2, (171-203), Online publication date: 1-Feb-2019.
- Zhou G, Zhao L, Shi Q, Zheng G and Chen K Rate-Delay Analysis of Radio Access Network Slices 2018 IEEE Global Communications Conference (GLOBECOM), (1-7)
- Mukherjee M, Liu Y, Lloret J, Guo L, Matam R and Aazam M Transmission and Latency-Aware Load Balancing for Fog Radio Access Networks 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
- Darir H, Sibai H, Borisov N, Dullerud G and Mitra S TightRope Proceedings of the 2018 Workshop on Privacy in the Electronic Society, (76-85)
- Las-Casas P, Mace J, Guedes D and Fonseca R Weighted Sampling of Execution Traces Proceedings of the ACM Symposium on Cloud Computing, (326-332)
- Sciancalepore V, Filippini I, Mancuso V, Capone A and Banchs A (2018). A Multi-Traffic Inter-Cell Interference Coordination Scheme in Dense Cellular Networks, IEEE/ACM Transactions on Networking, 26:5, (2361-2375), Online publication date: 1-Oct-2018.
- Goyal S, Le T, Chincholi A, Elkourdi T and Demir A (2018). On the packet allocation of multi-band aggregation wireless networks, Wireless Networks, 24:7, (2521-2537), Online publication date: 1-Oct-2018.
- Silva D, Zhang B and Ayhan H (2018). Admission control strategies for tandem Markovian loss systems, Queueing Systems: Theory and Applications, 90:1-2, (35-63), Online publication date: 1-Oct-2018.
- Khan F, Rehman A, Usman M, Tan Z and Puthal D (2018). Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest, Mobile Networks and Applications, 23:3, (479-488), Online publication date: 1-Jun-2018.
- AlGhadhban A and Shihada B Delay analysis of new-flow setup time in software defined networks NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, (1-7)
- Zeng Z, Liang N, Yang X and Hoi S (2018). Multi-target deep neural networks, Neurocomputing, 273:C, (634-642), Online publication date: 17-Jan-2018.
- Mozo A, Lpez-Presa J and Fernndez Anta A (2018). A distributed and quiescent max-min fair algorithm for network congestion control, Expert Systems with Applications: An International Journal, 91:C, (492-512), Online publication date: 1-Jan-2018.
- Salamí E, Barrado C, Gallardo A and Pastor E (2018). General queuing model for optimal seamless delivery of payload processing in multi-core processors, The Journal of Supercomputing, 74:1, (87-104), Online publication date: 1-Jan-2018.
- Wang L, Wu H, Han Z, Zhang P and Poor H Dynamic Resource Matching for Socially Cooperative Caching in IoT Networking GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
- Kadam S, Raut C and Kasbekar G Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous M2M Networks GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-7)
- Ruan L, Dias M and Wong E Towards Tactile Internet Capable E-Health: A Delay Performance Study of Downlink-Dominated SmartBANs GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-6)
- Shah-Mansouri H, Wong V and Schober R (2017). Joint Optimal Pricing and Task Scheduling in Mobile Cloud Computing Systems, IEEE Transactions on Wireless Communications, 16:8, (5218-5232), Online publication date: 1-Aug-2017.
- Talak R, Karaman S and Modiano E Capacity and delay scaling for broadcast transmission in highly mobile wireless networks Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, (1-10)
- Marašević J, Stein C and Zussman G (2017). Max-min Fair Rate Allocation and Routing in Energy Harvesting Networks, Algorithmica, 78:2, (521-557), Online publication date: 1-Jun-2017.
- Xu F, Ye W, Liu Y and Zhang W (2017). UFalloc, Mobile Networks and Applications, 22:2, (161-173), Online publication date: 1-Apr-2017.
- Jin J, Palaniswami M, Yuan D, Dong Y and Moessner K (2017). Priority Service Provisioning and Max---Min Fairness, Journal of Network and Systems Management, 25:2, (397-415), Online publication date: 1-Apr-2017.
- Antal E and Vinkó T (2017). Modeling max---min fair bandwidth allocation in BitTorrent communities, Computational Optimization and Applications, 66:2, (383-400), Online publication date: 1-Mar-2017.
- Liu B, Yan Z and Chen C (2017). Medium Access Control for Wireless Body Area Networks with QoS Provisioning and Energy Efficient Design, IEEE Transactions on Mobile Computing, 16:2, (422-434), Online publication date: 1-Feb-2017.
- Chen W, Ma L and Shen C (2016). Congestion-Aware MAC Layer Adaptation to Improve Video Telephony over Wi-Fi, ACM Transactions on Multimedia Computing, Communications, and Applications, 12:5s, (1-24), Online publication date: 12-Dec-2016.
- Ho V and Nikolaidis I Modeling time-varying topologies of duty-cycled wireless sensor networks Proceedings of the 7th Symposium on Information and Communication Technology, (187-194)
- Harks T, Hoefer M, Schewior K, Skopalik A, Harks T, Hoefer M, Schewior K and Skopalik A (2016). Routing Games With Progressive Filling, IEEE/ACM Transactions on Networking, 24:4, (2553-2562), Online publication date: 1-Aug-2016.
- Basmadjian R, Niedermeier F and de Meer H Modelling performance and power consumption of utilisation-based DVFS using M/M/1 queues Proceedings of the Seventh International Conference on Future Energy Systems, (1-11)
- Lu Y, Motani M and Wong W (2016). A QoE-aware resource distribution framework incentivizing context sharing and moderate competition, IEEE/ACM Transactions on Networking, 24:3, (1364-1377), Online publication date: 1-Jun-2016.
- Pham Van D, Rimal B, Maier M and Valcarenghi L (2016). Design, Analysis, and Hardware Emulation of a Novel Energy Conservation Scheme for Sensor Enhanced FiWi Networks (ECO-SFiWi), IEEE Journal on Selected Areas in Communications, 34:5, (1645-1662), Online publication date: 1-May-2016.
- Wang H, Rosa C and Pedersen K (2016). Dual connectivity for LTE-advanced heterogeneous networks, Wireless Networks, 22:4, (1315-1328), Online publication date: 1-May-2016.
- Eritmen K and Keskinoz M (2016). Rate-optimal fair power allocation in complex field network coded relay communications, Wireless Networks, 22:4, (1251-1267), Online publication date: 1-May-2016.
- Cai H, Koprulu I and Shroff N (2016). Exploiting double opportunities for latency-constrained content propagation in wireless networks, IEEE/ACM Transactions on Networking, 24:2, (1025-1037), Online publication date: 1-Apr-2016.
- Samarakoon S, Bennis M, Saad W and Latva-aho M (2016). Dynamic Clustering and
on /off Strategies for Wireless Small Cell Networks, IEEE Transactions on Wireless Communications, 15:3, (2164-2178), Online publication date: 1-Mar-2016. - Mertikopoulos P and Viossat Y (2016). Imitation dynamics with payoff shocks, International Journal of Game Theory, 45:1-2, (291-320), Online publication date: 1-Mar-2016.
- Jiayin Li , Dgien D, Hunter N, Zhao Y and Mohanram K (2015). Two-Port PCM Architecture for Network Processing, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:10, (2135-2148), Online publication date: 1-Oct-2015.
- Hemmati E and Garcia-Luna-Aceves J A New Approach to Name-Based Link-State Routing for Information-Centric Networks Proceedings of the 2nd ACM Conference on Information-Centric Networking, (29-38)
- Ho V and Nikolaidis I A Schedule Template Construction Technique for Duty Cycled Sensor Networks Proceedings of the 14th International Conference on Ad-hoc, Mobile, and Wireless Networks - Volume 9143, (48-61)
- Findrik M, Fevre Kristensen T, Hinterhofer T, Olsen R and Schwefel H Information-Quality Based LV-Grid-Monitoring Framework and Its Application to Power-Quality Control Proceedings of the 14th International Conference on Ad-hoc, Mobile, and Wireless Networks - Volume 9143, (317-329)
- Kovačević M and Vukobratović D (2015). Perfect codes in the discrete simplex, Designs, Codes and Cryptography, 75:1, (81-95), Online publication date: 1-Apr-2015.
- Chen W, Ma L and Shen C Congestion-aware MAC layer adaptation to improve video teleconferencing over wi-fi Proceedings of the 6th ACM Multimedia Systems Conference, (130-141)
- Yang S and Mccann J (2014). Distributed Optimal Lexicographic Max-Min Rate Allocation in Solar-Powered Wireless Sensor Networks, ACM Transactions on Sensor Networks, 11:1, (1-35), Online publication date: 7-Nov-2014.
- Takizawa Y IP packet distribution on wireless access route combining IEEE802.11/802.16 links for improvement of application performance Proceedings of the 12th ACM international symposium on Mobility management and wireless access, (15-23)
- Marašević J, Stein C and Zussman G Max-min fair rate allocation and routing in energy harvesting networks Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (367-376)
- Chang J and Sohi G Cooperative cache partitioning for chip multiprocessors ACM International Conference on Supercomputing 25th Anniversary Volume, (402-412)
- Kompella S and Ephremides A (2014). Stable Throughput Regions in Wireless Networks, Foundations and Trends® in Networking, 7:4, (235-338), Online publication date: 13-Mar-2014.
- Hou C, Zhang F, Anta A, Wang L and Liu Z (2014). A hop-by-hop energy efficient distributed routing scheme, ACM SIGMETRICS Performance Evaluation Review, 41:3, (101-106), Online publication date: 10-Jan-2014.
- Yuan L, Chen C, Mohapatra P, Chuah C and Kant K (2013). A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies, ACM Transactions on Internet Technology, 12:3, (1-26), Online publication date: 1-May-2013.
- Purkayastha P and Baras J (2013). Convergence results for ant routing algorithms via stochastic approximation, ACM Transactions on Autonomous and Adaptive Systems, 8:1, (1-34), Online publication date: 1-Apr-2013.
- Ripplinger D Backoff mechanisms in narrow band and spread spectrum aloha networks Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications, (13-18)
- Lee Z, Lee G, Oh H and Song H (2012). QoS-aware routing and power control algorithm for multimedia service over multi-hop mobile ad hoc network, Wireless Communications & Mobile Computing, 12:7, (567-579), Online publication date: 1-May-2012.
- Goldstein-Lev A and Ariav G (2012). Configuring Systems of Massively Distributed, Autonomous and Interdependent Decision Makers, International Journal of Decision Support System Technology, 4:2, (17-41), Online publication date: 1-Apr-2012.
- Altevogt P, Kiss T and Denzel W Modular performance simulations of clouds Proceedings of the Winter Simulation Conference, (3300-3311)
- Popa L, Krishnamurthy A, Ratnasamy S and Stoica I FairCloud Proceedings of the 10th ACM Workshop on Hot Topics in Networks, (1-6)
- Bonaci T and Bushnell L Node capture games Proceedings of the Second international conference on Decision and Game Theory for Security, (44-55)
- Gau V, Hwang J, Lan K, Pai H, Chen J and Chen Y Latency minimized probabilistic CSMA/CA Proceedings of the 6th ACM workshop on Wireless multimedia networking and computing, (3-8)
- Kenney J, Bansal G and Rohrs C LIMERIC Proceedings of the Eighth ACM international workshop on Vehicular inter-networking, (21-30)
- Khabbazian M, Kuhn F, Lynch N, Médard M and ParandehGheibi A MAC design for analog network coding Proceedings of the 7th ACM ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing, (42-51)
- Mozo A, López-Presa J and Fernández Anta A B-neck Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (217-218)
- Shakhov V and Shin S Optimization problems in proportional differentiated admission control Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-4)
- Wan C, Eisenman S and Campbell A (2011). Energy-efficient congestion detection and avoidance in sensor networks, ACM Transactions on Sensor Networks, 7:4, (1-31), Online publication date: 1-Feb-2011.
- Huang K, Duffy K and Malone D (2010). On the validity of IEEE 802.11 MAC modeling hypotheses, IEEE/ACM Transactions on Networking, 18:6, (1935-1948), Online publication date: 1-Dec-2010.
- Park J and Van Der Schaar M (2010). Medium access control protocols with memory, IEEE/ACM Transactions on Networking, 18:6, (1921-1934), Online publication date: 1-Dec-2010.
- Babaee R and Beaulieu N (2010). Cross-layer design for multihop wireless relaying networks, IEEE Transactions on Wireless Communications, 9:11, (3522-3531), Online publication date: 1-Nov-2010.
- Foo B and van der Schaar M (2010). A distributed approach for optimizing cascaded classifier topologies in real-time stream mining systems, IEEE Transactions on Image Processing, 19:11, (3035-3048), Online publication date: 1-Nov-2010.
- Christodoulopoulos K, Manousakis K and Varvarigos E (2010). Offline routing and wavelength assignment in transparent WDM networks, IEEE/ACM Transactions on Networking, 18:5, (1557-1570), Online publication date: 1-Oct-2010.
- Wang X, Wang D, Zhuang H and Morgera S (2010). Fair energy-efficient resource allocation in wireless sensor networks over fading TDMA channels, IEEE Journal on Selected Areas in Communications, 28:7, (1063-1072), Online publication date: 1-Sep-2010.
- Iradat F and Ghani S Determining normalized measure of dispersion for evaluating the performance of IEEE 802.11 Proceedings of the Third conference on Smart Spaces and next generation wired, and 10th international conference on Wireless networking, (196-206)
- Chen L, Low S and Doyle J (2010). Random access game and medium access control design, IEEE/ACM Transactions on Networking, 18:4, (1303-1316), Online publication date: 1-Aug-2010.
- Chiang Y and Chen K (2010). Optimal cooperative ALOHA multiple access in fading channels, IEEE Communications Letters, 14:8, (779-781), Online publication date: 1-Aug-2010.
- Hyytiä E, Penttinen A and Sulonen R Congestive collapse and its avoidance in a dynamic dial-a-ride system with time windows Proceedings of the 17th international conference on Analytical and stochastic modeling techniques and applications, (397-408)
- Nguyen G, Wieselthier J and Ephremides A (2010). Random access in wireless networks with overlapping cells, IEEE Transactions on Information Theory, 56:6, (2887-2892), Online publication date: 1-Jun-2010.
- Purkayastha P and Baras J Convergence results for ant routing algorithms viastochastic approximation Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (201-210)
- Namboodiri V and Pendse R (2010). Bit level synchronized MAC protocol for multireader RFID networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
- Wang H and Li T (2010). Stability analysis of hybrid ALOHA, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
- Xi Y and Yeh E (2010). Distributed algorithms for minimum cost multicast with network coding, IEEE/ACM Transactions on Networking, 18:2, (379-392), Online publication date: 1-Apr-2010.
- Alptekin G and Bener A (2010). Customer oriented resource allocation framework in cognitive radio, Computers and Industrial Engineering, 58:3, (401-410), Online publication date: 1-Apr-2010.
- Hyytiä E, Gojmerac I, Teofili S and Bianchi G Key escrow schemes with sliding window for privacy-aware anomaly detection system Proceedings of the 2010 EDBT/ICDT Workshops, (1-8)
- Tan S, Zheng D, Zhang J and Zeidler J Distributed opportunistic scheduling for ad-hoc communications under delay constraints Proceedings of the 29th conference on Information communications, (2874-2882)
- Neely M Delay-based network utility maximization Proceedings of the 29th conference on Information communications, (2669-2677)
- Tan J and Shroff N Transition from heavy to light tails in retransmission durations Proceedings of the 29th conference on Information communications, (1334-1342)
- Wang S, Zhang J and Tong L Delay analysis for cognitive radio networks with random access Proceedings of the 29th conference on Information communications, (1055-1063)
- Jindal A and Psounis K Making the case for random access scheduling in wireless multi-hop networks Proceedings of the 29th conference on Information communications, (151-155)
- Wu F, Zhong S and Liu J (2010). An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks, IEEE Transactions on Wireless Communications, 9:3, (1012-1021), Online publication date: 1-Mar-2010.
- Pandurangan G and Khan M Theory of communication networks Algorithms and theory of computation handbook, (27-27)
- To T and Choi J (2010). On exploiting idle channels in opportunistic multichannel ALOHA, IEEE Communications Letters, 14:1, (51-53), Online publication date: 1-Jan-2010.
- Gu J, Nah J, Kwon H, Jang J and Park S Performance Prediction in Peer-to-Peer MultiAgent Networks Agents and Peer-to-Peer Computing, (27-40)
- Andrew L, Low S and Wydrowski B (2009). Understanding XCP, IEEE/ACM Transactions on Networking, 17:6, (1697-1710), Online publication date: 1-Dec-2009.
- Sagduyu Y and Ephremides A (2009). On broadcast stability of queue-based dynamic network coding over erasure channels, IEEE Transactions on Information Theory, 55:12, (5463-5478), Online publication date: 1-Dec-2009.
- Miao G, Li G and Swami A Channel aware distributed random access Proceedings of the 28th IEEE conference on Global telecommunications, (2612-2617)
- Wang X, Wang D, Zhuang H and Morgera S Fair energy-efficient resource allocation over fading TDMA channels Proceedings of the 28th IEEE conference on Global telecommunications, (2163-2167)
- Huang Y, Pang A and Hung H (2009). A comprehensive analysis of low-power operation for beacon-enabled IEEE 802.15.4 wireless networks, IEEE Transactions on Wireless Communications, 8:11, (5601-5611), Online publication date: 1-Nov-2009.
- Tarique M, Tepe K, Adibi S and Erfani S (2009). Review, Journal of Network and Computer Applications, 32:6, (1125-1143), Online publication date: 1-Nov-2009.
- Li X and Yousefi'zadeh H (2009). MPCP, ACM SIGCOMM Computer Communication Review, 39:5, (5-11), Online publication date: 7-Oct-2009.
- Gau R (2009). Modeling the slotted nonpersistent CSMA protocol for wireless access networks with multiple packet reception, IEEE Communications Letters, 13:10, (797-799), Online publication date: 1-Oct-2009.
- Gamukama E and Popov O Evaluation approach for efficiency Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks, (312-316)
- Joo C, Lin X and Shroff N (2009). Understanding the capacity region of the Greedy maximal scheduling algorithm in multihop wireless networks, IEEE/ACM Transactions on Networking, 17:4, (1132-1145), Online publication date: 1-Aug-2009.
- Dinis R, Montezuma P, Bernardo L, Oliveira R, Pereira M and Pinto P (2009). Frequency-domain multipacket detection, IEEE Transactions on Wireless Communications, 8:7, (3798-3807), Online publication date: 1-Jul-2009.
- Subramanian V, Duffy K and Leith D (2009). Existence and uniqueness of fair rate allocations in lossy wireless networks, IEEE Transactions on Wireless Communications, 8:7, (3401-3406), Online publication date: 1-Jul-2009.
- Hui D and Lau V (2009). Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT, IEEE Transactions on Wireless Communications, 8:7, (3484-3491), Online publication date: 1-Jul-2009.
- Rong B and Ephremides A Protocol-level cooperation in wireless networks Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (151-160)
- Paek J and Neely M Mathematical analysis of throughput bounds in random access with ZIGZAG decoding Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (32-38)
- Supittayapornpong S and Saengudomlert P Joint flow control, routing and medium access control in random access multi-hop wireless networks Proceedings of the 2009 IEEE international conference on Communications, (4967-4972)
- Bukkapatanam V, Franklin A and Murthy C Using partially overlapped channels for end-to-end flow allocation and channel assignment in wireless mesh networks Proceedings of the 2009 IEEE international conference on Communications, (4650-4655)
- Li X and Yousefi'zadeh H Distributed ECN-based congestion control Proceedings of the 2009 IEEE international conference on Communications, (2230-2235)
- Liu X Capacity allocation for long tailed traffic in packet switching networks Proceedings of the 2009 IEEE international conference on Communications, (1119-1123)
- Durmus Y, Ozgovde B and Ersoy C Event Based Fairness for Video Surveillance Sensor Networks Proceedings of the 8th International IFIP-TC 6 Networking Conference, (40-51)
- Marano S, Matta V and Willett P (2009). Distributed detection with censoring sensors under physical layer secrecy, IEEE Transactions on Signal Processing, 57:5, (1976-1986), Online publication date: 1-May-2009.
- Yang Z, Li S, Feng H, Honold T and Yu G Cross-layer iterative decoding of irregular LDPC codes using cyclic redundancy check codes Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (942-947)
- Yu M and Leung K (2009). A trustworthiness-based QoS routing protocol for wireless ad hoc networks, IEEE Transactions on Wireless Communications, 8:4, (1888-1898), Online publication date: 1-Apr-2009.
- Liu Y, Mohan G, Chua K and Lu J (2009). Multipath traffic engineering in WDM optical burst switching networks, IEEE Transactions on Communications, 57:4, (1099-1108), Online publication date: 1-Apr-2009.
- Wang B, Ji Z, Liu K and Clancy T (2009). Primary-prioritized Markov approach for dynamic spectrum allocation, IEEE Transactions on Wireless Communications, 8:4, (1854-1865), Online publication date: 1-Apr-2009.
- Kim J, Lee J and Jo J (2009). Hierarchical spanning tree network design with Nash genetic algorithm, Computers and Industrial Engineering, 56:3, (1040-1052), Online publication date: 1-Apr-2009.
- Cho J, Mo J and Chong S (2009). Joint network-wide opportunistic scheduling and power control in multi-cell networks, IEEE Transactions on Wireless Communications, 8:3, (1520-1531), Online publication date: 1-Mar-2009.
- Choi J and Chan V (2009). Resource management for advanced transmission antenna satellites, IEEE Transactions on Wireless Communications, 8:3, (1308-1321), Online publication date: 1-Mar-2009.
- Farrokh A, Krishnamurthy V and Schober R (2009). Optimal adaptive modulation and coding with switching costs, IEEE Transactions on Communications, 57:3, (697-706), Online publication date: 1-Mar-2009.
- Mohsenian-Rad A, Huang J, Chiang M and Wong V (2009). Utility-optimal random access, IEEE Transactions on Wireless Communications, 8:2, (898-911), Online publication date: 1-Feb-2009.
- Bolla R, Bruschi R and Sciuto M A scalable approach for steady state traffic modeling in high-speed backbone networks Proceedings of the First international conference on COMmunication Systems And NETworks, (584-585)
- Ibrahim A, Seddik K and Liu K (2009). Connectivity-aware network maintenance and repair via relays deployment, IEEE Transactions on Wireless Communications, 8:1, (356-366), Online publication date: 1-Jan-2009.
- Zarringhalam F, Seyfe B, Shikh-Bahaei M, Charbit G and Aghvami H (2009). Jointly optimized rate and outer loop power control with single-and multi-user detection, IEEE Transactions on Wireless Communications, 8:1, (186-195), Online publication date: 1-Jan-2009.
- Ardagna D, Ghezzi C and Mirandola R Model Driven QoS Analyses of Composed Web Services Proceedings of the 1st European Conference on Towards a Service-Based Internet, (299-311)
- Xia Y, Subramanian L, Stoica I and Kalyanaraman S (2008). One more bit is enough, IEEE/ACM Transactions on Networking, 16:6, (1281-1294), Online publication date: 1-Dec-2008.
- Lee Z and Song H Dynamic Power Efficient QoS Routing Algorithm for Multimedia Services over Mobile Ad Hoc Networks Information Networking. Towards Ubiquitous Networking and Services, (751-760)
- Sagduyu Y, Guo D and Berry R Throughput and stability of digital and analog network coding for wireless networks with single and multiple relays Proceedings of the 4th Annual International Conference on Wireless Internet, (1-9)
- Allalouf M and Shavitt Y (2008). Centralized and distributed algorithms for routing and weighted max-min fair bandwidth allocation, IEEE/ACM Transactions on Networking, 16:5, (1015-1024), Online publication date: 1-Oct-2008.
- Kuo W (2008). Supporting multimedia streaming and best-effort data transmission over IEEE 802.11e EDCA, International Journal of Network Management, 18:3, (209-228), Online publication date: 1-Jul-2008.
- Namboodiri V and Keshavarzian A Alert Proceedings of the 7th international conference on Information processing in sensor networks, (159-170)
- Suksomboon K, Satayapiwat P and Aswakul C Software development for automated network design supporting unicast and multicast traffics in next generation network Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-8)
- Karenos K, Kalogeraki V and Krishnamurthy S (2008). Cluster-based congestion control for sensor networks, ACM Transactions on Sensor Networks, 4:1, (1-39), Online publication date: 1-Jan-2008.
- Habib S (2008). Redesigning network topology with technology considerations, International Journal of Network Management, 18:1, (1-13), Online publication date: 1-Jan-2008.
- Usha M and Banu R (2007). A proactive mechanism for quality of service control in high speed networks, International Journal of Business Information Systems, 2:3, (312-327), Online publication date: 1-Nov-2007.
- Leino J, Penttinen A and Virtamo J Flow-optimized random access for wireless multihop networks Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (387-394)
- Sow D, Lim L, Wang M and Kim K Persisting and querying biometric event streams with hybrid relational-XML DBMS Proceedings of the 2007 inaugural international conference on Distributed event-based systems, (189-197)
- Jelenkovic P and Tan J Is ALOHA causing power law delays? Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks, (1149-1160)
- Ray S, Guérin R and Sofia R Distributed path computation without transient loops Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks, (104-116)
- Chang J and Sohi G Cooperative cache partitioning for chip multiprocessors Proceedings of the 21st annual international conference on Supercomputing, (242-252)
- Vidács A and Virtamo J Minimum transmission energy trajectories for a linear pursuit problem Proceedings of the 1st EuroFGI international conference on Network control and optimization, (286-295)
- Kim S and Choi M (2007). Evolutionary algorithms for route selection and rate allocation in multirate multicast networks, Applied Intelligence, 26:3, (197-215), Online publication date: 1-Jun-2007.
- Wu C and Li B Optimal rate allocation in overlay content distribution Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (678-690)
- Selvi V, Sharfraz S and Parthasarathi R Mobile ad hoc grid using trace based mobility model Proceedings of the 2nd international conference on Advances in grid and pervasive computing, (274-285)
- Lihua Yuan , Kant K, Mohapatra P and Chen-Nee Chuah A Proxy View of Quality of Domain Name Service Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (321-329)
- Junshan Zhang , Dong Zheng and Mung Chiang The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (222-230)
- Neely M Optimal Pricing in a Free Market Wireless Network Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (213-221)
- Marbach P Distributed Scheduling and Active Queue Management in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2321-2325)
- Momcilovic P Scalability of Routing Tables in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1262-1270)
- Jelenkovic P and Jian Tan Can Retransmissions of Superexponential Documents Cause Subexponential Delays? Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (892-900)
- Ho J, Hwang W and Shieh C (2007). A priority-aware CSMA/CP MAC protocol for the all-optical IP-over-WDM metropolitan area ring network, Journal of High Speed Networks, 16:2, (157-173), Online publication date: 1-Apr-2007.
- Zhu Han , Pandana C and Liu K Distributive Opportunistic Spectrum Access for Cognitive Radio using Correlated Equilibrium and No-Regret Learning Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (11-15)
- Seyfi A and Ashtiani F Effect of Leaky-Bucket-Based Traffic Shaping on Capacity Enhancement for VSG-CDMA Cellular Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3692-3696)
- Xinhua Ling , Yu Cheng , Mark J and Xuemin Shen A General Analytical Model for the IEEE 802.15.4 Contention Access Period Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (316-321)
- Ganesanj G, Ye Li and Vook F Stability Region of Multicarrier Channel Aware Aloha Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2221-2225)
- Zarringhalam F, Seyfe B, Shikh-Bahaei M, Kobravi A and Charbit G Adaptive Power and Rate Transmission with Single and Multi-User Detection Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1722-1727)
- Kim J, Jo J and Yang H A solution for bi-level network design problem through nash genetic algorithm Proceedings of the 1st international conference on Advances in hybrid information technology, (269-280)
- Sagduyu Y and Ephremides A A game-theoretic look at throughput and stability in random access Proceedings of the 2006 IEEE conference on Military communications, (2116-2122)
- Mantar H A quantitative qos routing model for diffserv aware MPLS networks Proceedings of the 6th IEEE international conference on IP Operations and Management, (61-71)
- Bojkovic Z and Milovanovic D Cross-layer quality of service for video wireless multimedia delivery Proceedings of the 5th WSEAS international conference on Data networks, communications and computers, (95-101)
- Elias J, Martignon F and Capone A An efficient dynamic bandwidth allocation algorithm for quality of service networks Proceedings of the First IFIP TC6 international conference on Autonomic Networking, (132-145)
- Chou Z, Hsu C and Hsu S (2006). UPCF, IEEE/ACM Transactions on Networking, 14:4, (807-820), Online publication date: 1-Aug-2006.
- Tsaur L and Lee D (2006). Closed-loop architecture and protocols for rapid dynamic spreading gain adaptation in CDMA networks, IEEE/ACM Transactions on Networking, 14:4, (821-834), Online publication date: 1-Aug-2006.
- Gong Y and Marbach P Interaction of rate and medium access control in wireless networks Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, (178-189)
- Capone A, Elias J, Martignon F and Pujolle G Dynamic resource allocation in communication networks Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (892-903)
- Wu C and Li B Optimal peer selection for minimum-delay peer-to-peer streaming with rateless codes Proceedings of the ACM workshop on Advances in peer-to-peer multimedia streaming, (69-78)
- Kim M, Bang Y and Choo H Estimated path selection for the delay constrained least cost path Proceedings of the 10th Panhellenic conference on Advances in Informatics, (112-122)
- Oikonomou K and Stavrakakis I (2005). Analysis of topology-unaware TDMA MAC policies for ad-hoc networks under diverse traffic loads, ACM SIGMOBILE Mobile Computing and Communications Review, 9:4, (25-38), Online publication date: 1-Oct-2005.
- Xia Y, Subramanian L, Stoica I and Kalyanaraman S (2005). One more bit is enough, ACM SIGCOMM Computer Communication Review, 35:4, (37-48), Online publication date: 1-Oct-2005.
- Xia Y, Subramanian L, Stoica I and Kalyanaraman S One more bit is enough Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (37-48)
- Capone A, Elias J, Martignon F and Pujolle G Dynamic resource allocation in quality of service networks Proceedings of the Second international conference on Wireless Systems and Network Architectures in Next Generation Internet, (184-197)
- Daniel L, Luukkainen M and Kojo M Experiences in using SDL to support the design and implementation of a logical link layer protocol Proceedings of the 12th international conference on Model Driven, (187-197)
- Yang Z and Nahrstedt K A bandwidth management framework for wireless camera array Proceedings of the international workshop on Network and operating systems support for digital audio and video, (147-152)
- Zhu M, Cai W, Lee B and Wu X (2005). A Hybrid Analysis of an Optimization Approach for Cluster Applications, The Journal of Supercomputing, 32:3, (191-215), Online publication date: 1-Jun-2005.
- Abichar Z and Chang J CONTI Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (358-369)
- Yin S and Lin X Multipath energy efficient routing in mobile ad hoc network Proceedings of the 4th international conference on Networking - Volume Part II, (226-233)
- Kelly F and Voice T (2005). Stability of end-to-end algorithms for joint routing and rate control, ACM SIGCOMM Computer Communication Review, 35:2, (5-12), Online publication date: 1-Apr-2005.
- Gupta R, Chi E and Walrand J (2005). Different Algorithms for Normal and Protection Paths, Journal of Network and Systems Management, 13:1, (13-33), Online publication date: 1-Mar-2005.
- Bolla R, Bruschi R and Davoli F Planning multiservice VPN networks Proceedings of the Third international conference on Quality of Service in Multiservice IP Networks, (176-190)
- Xia Y, Harrison D, Kalyanaraman S, Ramachandran K and Venkatesan A (2005). Accumulation-based congestion control, IEEE/ACM Transactions on Networking, 13:1, (69-80), Online publication date: 1-Feb-2005.
- Hwang E, Won J, Ko Y, Lee H and Cho C Random channel allocation scheme in HIPERLAN/2 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part I, (25-32)
- Popovski P, Fitzek F and Prasad R Batch conflict resolution algorithm with progressively accurate multiplicity estimation Proceedings of the 2004 joint workshop on Foundations of mobile computing, (31-40)
- Bejerano Y, Han S and Li L Fairness and load balancing in wireless LANs using association control Proceedings of the 10th annual international conference on Mobile computing and networking, (315-329)
- Chang J and Tassiulas L (2004). Maximum lifetime routing in wireless sensor networks, IEEE/ACM Transactions on Networking, 12:4, (609-619), Online publication date: 1-Aug-2004.
- Elkin M Unconditional lower bounds on the time-approximation tradeoffs for the distributed minimum spanning tree problem Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (331-340)
- Zheng D, Liu X, Mandal M and Lu W (2004). Virtual Traffic Path Optimization in Connection-Oriented Networks with Stochastic Traffic, Journal of Network and Systems Management, 12:2, (231-249), Online publication date: 1-Jun-2004.
- Mišic´ J and Tam Y (2003). Non-uniform traffic issues in DCA wireless multimedia networks, Wireless Networks, 9:6, (605-622), Online publication date: 1-Nov-2003.
- Ayyildiz D and Deliç H (2003). Packet reservation window multiple access for microcellular voice/data transmission, Wireless Networks, 9:6, (585-592), Online publication date: 1-Nov-2003.
- Liu X (2003). Network capacity allocation for traffic with time priorities, International Journal of Network Management, 13:6, (411-417), Online publication date: 1-Nov-2003.
- Zhou Y and Sethu H On achieving fairness in the joint allocation of processing and bandwidth resources Proceedings of the 11th international conference on Quality of service, (97-114)
- Liu X (2003). Capacity and flow assignment issues in MPLS networks, International Journal of Network Management, 13:3, (173-179), Online publication date: 1-May-2003.
- Bolla R, Davoli F and Repetto M A control architecture for quality of service and resource allocation in multiservice IP networks Proceedings of the 2003 international conference on Architectures for quality of service in the internet, (49-63)
- Shah S, Chen K and Nahrstedt K Dynamic Bandwidth Management for Single-Hop Ad Hoc Wireless Networks Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
- Kreidi A and Sansò B (2003). Optimization of an internationally distributed air, Computers and Operations Research, 30:2, (253-277), Online publication date: 1-Feb-2003.
- Cooper R Queueing theory Encyclopedia of Computer Science, (1496-1498)
- Tong H and Brown T (2002). Reinforcement Learning for Call Admission Control and Routing under Quality of Service Constraints in Multimedia Networks, Machine Language, 49:2-3, (111-139), Online publication date: 1-Nov-2002.
- Servetto S and Barrenechea G Constrained random walks on random graphs Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, (12-21)
- Battou A, Khan B, Lee D, Marsh S, Mountcastle S and Talmage D (2002). CASiNO, Software—Practice & Experience, 32:11, (1099-1128), Online publication date: 1-Sep-2002.
- Liu X (2002). Network optimization with stochastic traffic flows, International Journal of Network Management, 12:4, (225-234), Online publication date: 15-Jul-2002.
- Meierhofer J (2002). HYPERFLOW, Wireless Personal Communications: An International Journal, 20:2, (189-203), Online publication date: 1-Feb-2002.
- Nakano K and Olariu S Leader election protocols for radio networks Handbook of wireless networks and mobile computing, (219-242)
- Ekici E and Ersoy C (2001). Multi-Tier Cellular Network Dimensioning, Wireless Networks, 7:4, (401-411), Online publication date: 1-Sep-2001.
- Zhu C and Corson M (2001). A Five-Phase Reservation Protocol (FPRP) for Mobile Ad Hoc Networks, Wireless Networks, 7:4, (371-384), Online publication date: 1-Sep-2001.
- Lee D (2001). Worst Traffic Passing Virtual Frame Regulation, Queueing Systems: Theory and Applications, 38:4, (381-395), Online publication date: 1-Aug-2001.
- Ferng H and Chang J (2000). The departure process of discrete-time queueing systems with Markovian type inputs, Queueing Systems: Theory and Applications, 36:1/3, (201-220), Online publication date: 14-Nov-2000.
- Berger A and Kogan Y (2000). Dimensioning bandwidth for elastic traffic in high-speed data networks, IEEE/ACM Transactions on Networking, 8:5, (643-654), Online publication date: 1-Oct-2000.
- Bejerano Y, Cidon I and Naor J Dynamic session management for static and mobile users Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications, (65-74)
- Koutsakis P and Paterakis M On Multiple Traffic Type Integration over Wireless TDMA Channels Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
- Iren S, Amer P and Conrad P (1999). The transport layer, ACM Computing Surveys, 31:4, (360-404), Online publication date: 1-Dec-1999.
- Liao R and Campbell A On programmable universal mobile channels in a cellular Internet Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, (191-202)
- Khan A, Al-Darwish N, Guizani M, Benten M and Youssef H (1997). Design and implementation of a software bridge with packet filtering and statistics collection functions, International Journal of Network Management, 7:5, (251-263), Online publication date: 1-Sep-1997.
- Ko K, Tang K, Chan C, Man K and Kwong S (1997). Using Genetic Algorithms to Design Mesh Networks, Computer, 30:8, (56-61), Online publication date: 1-Aug-1997.
- Ali I, Mouftah H and El-Sawi A A Dynamic Routing Protocol for Broadband Networks Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
- Lin R, Lam C and Lee T Performance and Complexity of Multicast Cross-Path ATM Switches Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
- Twu D Adaptive Control Strategy for the Multi-layer Collision Resolution Protocol Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
- Agusleo H and Soparkar N Employing Logic-Enhanced Memory for High-performance ATM Network Interfaces Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
- Bertsekas D, Guerriero F and Musmanno R (1996). Parallel asynchronous label-correcting methods for shortest paths, Journal of Optimization Theory and Applications, 88:2, (297-320), Online publication date: 1-Feb-1996.
- Impact of self-similarity on the go-back-N ARQ protocols Proceedings of the 4th International Conference on Computer Communications and Networks
- Chlamtac I and Farago A (1994). An Optimal Channel Access Protocol with Multiple Reception Capacity, IEEE Transactions on Computers, 43:4, (480-484), Online publication date: 1-Apr-1994.
- Georgiadis L, Guérin R and Cidon I (1993). Throughput properties of fair policies in ring networks, IEEE/ACM Transactions on Networking, 1:6, (718-728), Online publication date: 1-Dec-1993.
- Zhang S, Shen Z and Zhang G Cost Minimization for Geo-Distributed Data Centers with Renewable Resources and Energy Storages 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
- Kim K, Li C, Kadota I and Modiano E Optimal scheduling of real-time traffic in wireless networks with delayed feedback 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1143-1149)
Index Terms
- Data networks (2nd ed.)
Recommendations
Secure data aggregation in wireless sensor networks: A comprehensive overview
Wireless sensor networks often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to resource restricted sensor nodes, it is important to minimize the amount of data ...
Active node determination for correlated data gathering in wireless sensor networks
In wireless sensor network applications where data gathered by different sensor nodes is correlated, not all sensor nodes need to be active for the wireless sensor network to be functional. Given that the sensor nodes that are selected as active form a ...
Achieving Scalable Privacy Preserving Data Aggregation for Wireless Sensor Networks
CIT '10: Proceedings of the 2010 10th IEEE International Conference on Computer and Information TechnologyA sink node must be aware of the identifications (node IDs) of those all sensor nodes which contribute in aggregated value of sensors data in order to derive exact result of them in privacy preserving data aggregation scheme for wireless sensor networks ...