Abstract is missing.
- Scalable landmark flooding: a scalable routing protocol for WSNsPengfei Di, Thomas Fuhrmann. 1-2 [doi]
- An adaptive three-party accounting protocolGregory Detal, Damien Leroy, Olivier Bonaventure. 3-4 [doi]
- On the characterization of multi-channel applicationsWalter de Donato, Antonio Pescapè. 5-6 [doi]
- Deep diving into BitTorrent localityRubén Cuevas, Nikolaos Laoutaris, Xiaoyuan Yang 0001, Georgos Siganos, Pablo Rodriguez. 7-8 [doi]
- Deterministic, reduced-visibility inter-domain forwardingStephen D. Strowes, Colin Perkins. 9-10 [doi]
- A spectrum assignment method based on genetic algorithm in WiMAX/WiFi integrated networkMasashi Nakagawa, Kazuhiko Kinoshita, Koso Murakami, Keita Kawano. 11-12 [doi]
- What can P2P do for traffic control in P2P networks?HyunYong Lee, Akihiro Nakao, JongWon Kim 0001. 13-14 [doi]
- Towards systematic traffic annotationRomain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda. 15-16 [doi]
- Improving roamer retention by exposing weak locations in GSM networksMichal Ficek, Lukas Kencl. 17-18 [doi]
- An a priori estimator for the delay distribution in global hybrid multicastMatthias Wählisch, Thomas C. Schmidt. 19-20 [doi]
- What level of estimating accuracy does TCP need and can TCP achieveLin Cong, Guohan Lu, Yang Chen, Beixing Deng, Xing Li. 21-22 [doi]
- Netflow based system for NAT detectionVojtech Krmicek, Jan Vykopal, Radek Krejcí. 23-24 [doi]
- A robust pair-wise rekeying protocol in hierarchical wireless sensor networksAn-Ni Shen, Song Guo 0001. 25-26 [doi]
- Random key pre-distribution with transitory master key for wireless sensor networksFilippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo. 27-28 [doi]
- Investigating the relationship between QoS and QoE in a mixed desktop/handheld gaming settingMaarten Wijnants, Stijn Agten, Peter Quax, Wim Lamotte. 29-30 [doi]
- Self-propagating worms in wireless sensor networksThanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad. 31-32 [doi]
- Is it me?: understanding the impact of the home network on end-to-end measurementsLucas DiCioccio, Renata Teixeira, Catherine Rosenberg. 33-34 [doi]
- Maximizing streaming quality in heterogeneous overlays through incentivesIlias Chatzidrossos. 35-36 [doi]
- Secure interference reporting for dense Wi-Fi deploymentsPantelis A. Frangoudis, Dimitrios I. Zografos, George C. Polyzos. 37-38 [doi]
- LT network codes: low complexity network codesMary-Luc Champel, Kévin Huguenin, Anne-Marie Kermarrec, Nicolas Le Scouarnec. 39-40 [doi]
- Adding emulation to planetlab nodesMarta Carbone, Luigi Rizzo. 41-42 [doi]
- Bloom filters and overlays for routing in pocket switched networksChristoph P. Mayer. 43-44 [doi]
- Peer the peers: an overlay id assignment service at internet exchange pointsMatthias Wählisch, Thomas C. Schmidt. 45-46 [doi]
- Practical DHT-based location service for wireless mesh networksMehdi Bezahaf, Marcelo Dias de Amorim, Serge Fdida, Luigi Iannone. 47-48 [doi]
- Relative delay estimator for multipath transportFei Song 0001, Hongke Zhang, Sidong Zhang, Fernando M. V. Ramos, Jon Crowcroft. 49-50 [doi]
- When stochastic rate-delay services meet stochastic network calculusKai Wang, Chuang Lin. 51-52 [doi]
- On the utility of rate adaptation for broadcast/multicast media traffic in 802.11 networksKyungsoo Lee, Sangki Yun, Yongtae Park, Hyogon Kim. 53-54 [doi]
- Reliable asymmetric path capacity measurementEdmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang. 55-56 [doi]
- Behavior rule based intrusion detectionMasayoshi Mizutani, Keiji Takeda, Jun Murai. 57-58 [doi]