28. INFOCOM 2009:
Rio de Janeiro,
Brazil
INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil.
IEEE 2009
Congestion Control 1
Routing 1
- Rafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock:
Multirate Anypath Routing in Wireless Mesh Networks.
37-45
- Hongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang:
Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks.
46-54
- Simon Heimlicher, Merkourios Karaliopoulos, Hanoch Levy, Thrasyvoulos Spyropoulos:
On Leveraging Partial Paths in Partially-Connected Networks.
55-63
- Yujun Li, Yaling Yang, Xianliang Lu:
Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing.
64-72
P2P 1
- Di Wu, Yong Liu, Keith W. Ross:
Queuing Network Models for Multi-Channel P2P Live Streaming Systems.
73-81
- Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao:
Distilling Superior Peers in Large-Scale P2P Streaming Systems.
82-90
- Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. Ramakrishnan, Rittwik Jana, Divesh Srivastava:
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast.
91-99
- Eugenio Alessandria, Massimo Gallo, Emilio Leonardi, Marco Mellia, Michela Meo:
P2P-TV Systems under Adverse Network Conditions: A Measurement Study.
100-108
Sensor Networks 1
- Ming-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Liu, Wei Shu:
Surface Coverage in Wireless Sensor Networks.
109-117
- Ji Luo, Dan Wang, Qian Zhang:
Double Mobility: Coverage of the Sea Surface with Mobile Sensor Networks.
118-126
- Anwar Saipulla, Cédric Westphal, Benyuan Liu, Jie Wang:
Barrier Coverage of Line-Based Deployed Wireless Sensor Networks.
127-135
- Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun Sinha:
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks.
136-144
Energy Efficiency
Network Coding 1
Vehicular,
Delay Tolerant Networks
Congestion Control 2
- Ruogu Li, Lei Ying, Atilla Eryilmaz, Ness B. Shroff:
A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows.
253-261
- Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha, Injong Rhee:
DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks.
262-270
- Krishna Prasanna Jagannathan, Eytan Modiano, Lizhong Zheng:
On the Trade-Off Between Control Rate and Congestion in Single Server Systems.
271-279
- Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard, Michael Mitzenmacher, João Barros:
Network Coding Meets TCP.
280-288
Routing 2
P2P 2
- Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu:
Analysis of Adaptive Incentive Protocols for P2P Networks.
325-333
- Xinyu Zhang, Baochun Li:
On the Market Power of Network Coding in P2P Content Distribution Systems.
334-342
- Raul Landa, David Griffin, Richard G. Clegg, Eleni Mykoniati, Miguel Rio:
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks.
343-351
- Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki:
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks.
352-360
Sensor Networks 2
- Xiaoyu Chu, Harish Sethu:
A New Distributed Algorithm for Even Coverage and Improved Lifetime in a Sensor Network.
361-369
- Maleq Khan, V. S. Anil Kumar, Madhav V. Marathe, Gopal Pandurangan, S. S. Ravi:
Bi-Criteria Approximation Algorithms for Power-Efficient and Low-Interference Topology Control in Unreliable Ad Hoc Networks.
370-378
- Matthew P. Johnson, Deniz Sarioz, Amotz Bar-Noy, Theodore Brown, Dinesh Verma, Chai Wah Wu:
More is More: The Benefits of Denser Sensor Deployment.
379-387
- Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia:
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks.
388-396
Security 1
Network Coding 2
Wireless / QoS
Inference 1
- MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Peir:
Fit a Spread Estimator in Small Memory.
504-512
- Fang Hao, Murali S. Kodialam, T. V. Lakshman, Haoyu Song:
Fast Multiset Membership Testing Using Combinatorial Bloom Filters.
513-521
- Yi Lu, Balaji Prabhakar:
Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture.
522-530
- Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wang:
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints.
531-539
Routing 3
P2P 3
Sensor Networks 3
Security 2
- Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Jun Li:
Packet Classification Algorithms: From Theory to Practice.
648-656
- Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy:
Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks.
657-665
- Jie Yang, Yingying Chen, Wade Trappe, Jay Cheng:
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
666-674
- Song Liu, Yingying Chen, Wade Trappe, Larry J. Greenstein:
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks.
675-683
Measurements,
Management
Optical 1
- Duan-Shin Lee, Kai-Jie Hsu, Cheng-Shang Chang, Jay Cheng:
Emulation and Approximation of a Flexible Delay Line by Parallel Non-Overtaking Delay Lines.
720-728
- Josef Kanizo, David Hay, Isaac Keslassy:
The Crosspoint-Queued Switch.
729-737
- Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee:
SDL Constructions of FIFO, LIFO and Absolute Contractors.
738-746
- Cheng-Shang Chang, Yu-Hao Hsu, Jay Cheng, Duan-Shin Lee:
A Dynamic Frame Sizing Algorithm for CICQ Switches with 100% Throughput.
747-755
Architecture,
Survivability
Inference 2
DTN 1
P2P 4
Sensor Networks 4
Security 3
- Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Qiao:
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query.
936-944
- Jing Shi, Rui Zhang, Yanchao Zhang:
Secure Range Queries in Tiered Sensor Networks.
945-953
- Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
954-962
- Shucheng Yu, Kui Ren, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
963-971
Incentive Pricing and Game Theory
Optical 2
Resource Management
Inference 3
DTN 2
- Pierre-Ugo Tournoux, Jeremie Leguay, Farid Benbadis, Vania Conan, Marcelo Dias de Amorim, John Whitbeck:
The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN Routing.
1116-1124
- Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar Kalyanaraman:
An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks.
1125-1133
- Eitan Altman, Giovanni Neglia, Francesco De Pellegrini, Daniele Miorandi:
Decentralized Stochastic Control of Delay Tolerant Networks.
1134-1142
- Abdul Jabbar, Justin P. Rohrer, Andrew Oberthaler, Egemen K. Cetinkaya, Victor Frost, James P. G. Sterbenz:
Performance Comparison of Weather Disruption-Tolerant Cross-Layer Routing Algorithms.
1143-1151
P2P 5
Sensor Networks 5
- Liang Liu, Xi Zhang, Huadong Ma:
Dynamic Node Collaboration for Mobile Target Tracking in Wireless Camera Sensor Networks.
1188-1196
- Dengpan Zhou, Jie Gao:
Opportunistic Processing and Query of Motion Trajectories in Wireless Sensor Networks.
1197-1205
- Yong Yang, I-Hong Hou, Jennifer C. Hou, Mallikarjun Shankar, Nageswara S. V. Rao:
Sensor Placement for Detecting Propagative Sources in Populated Environments.
1206-1214
- Ziguo Zhong, Ting Zhu, Dan Wang, Tian He:
Tracking with Unreliable Node Sequences.
1215-1223
Security 4
Wireless Scheduling 1
TCAM / Optical
Capacity
Inference 4
- Shrinivasa Kini, Srinivasan Ramasubramanian, Amund Kvalbein, Audun Fosselie Hansen:
Fast Recovery from Dual Link Failures in IP Networks.
1368-1376
- Paul Barford, Nick Duffield, Amos Ron, Joel Sommers:
Network Performance Anomaly Detection and Localization.
1377-1385
- Hung Xuan Nguyen, Renata Teixeira, Patrick Thiran, Christophe Diot:
Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis.
1386-1394
- Darryl Veitch, Brice Augustin, Renata Teixeira, Timur Friedman:
Failure Control in Multipath Route Tracing.
1395-1403
DTN 3
P2P 6
Security 5
- Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci:
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks.
1476-1484
- Jasmina Omic, Ariel Orda, Piet Van Mieghem:
Protecting Against Network Infections: A Game Theoretic Perspective.
1485-1493
- Marc Lelarge, Jean Bolot:
Economic Incentives to Increase Security in the Internet: The Case for Insurance.
1494-1502
- Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Defending Mobile Phones from Proximity Malware.
1503-1511
Wireless Scheduling 2
- Wei Cheng, Xiuzhen Cheng, Taieb Znati, Xicheng Lu, Zexin Lu:
The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks.
1512-1520
- Bo Han, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Anand Srinivasan:
Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks.
1521-1529
- Liqun Fu, Soung Chang Liew, Jianwei Huang:
Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design.
1530-1538
- Karthikeyan Sundaresan, Sampath Rangarajan:
Efficient Algorithms for Leveraging Spatial Reuse in OFDMA Relay Networks.
1539-1547
Optical 3
LAN,
Access Networks
Game Theory,
Wireless
- Eitan Altman, Ishai Menache, Alberto Suarez:
Team and Noncooperative Solutions to Access Control with Priorities.
1611-1619
- Amir Nahir, Ariel Orda, A. Freund:
Topology Design and Control: A Game-Theoretic Perspective.
1620-1628
- Eitan Altman, Anurag Kumar, Chandramani Kishore Singh, Rajesh Sundaresan:
Spatial SINR Games Combining Base Station Placement and Mobile Association.
1629-1637
- Xin Ai, Vikram Srinivasan, Chen-Khong Tham:
Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network.
1638-1646
Ad Hoc 1
Wireless Scheduling 3
Sensor Networks 6
Security 6
- Adam Bender, Rob Sherwood, Derek Monner, Nathan Goergen, Neil Spring, Bobby Bhattacharjee:
Fighting Spam with the NeighborhoodWatch DHT.
1755-1763
- Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, M. Stephenson, J. Barker:
Detecting Spam Zombies by Monitoring Outgoing Messages.
1764-1772
- Jun-Won Ho, Matthew Wright, Samir K. Das:
Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.
1773-1781
- Lei Yu, Jianzhong Li:
Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks.
1782-1790
Coding,
Wireless
MAC 1
- Chih-Cheng Hsu, Kuang-Fu Lai, Cheng-Fu Chou, Kate Ching-Ju Lin:
ST-MAC: Spatial-Temporal MAC Scheduling for Underwater Sensor Networks.
1827-1835
- Petar Djukic, Prasant Mohapatra:
Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware.
1836-1844
- Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xiaorui Wang:
C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks.
1845-1853
- HyungJune Lee, Hyukjoon Kwon, Arik Motskin, Leonidas J. Guibas:
Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach.
1854-1862
Ad Hoc 2
- Cheng Wang, Xiang-Yang Li, Changjun Jiang, ShaoJie Tang, Yunhao Liu, Jizhong Zhao:
Scaling Laws on Multicast Capacity of Large Scale Wireless Networks.
1863-1871
- Olga Goussevskaia, Roger Wattenhofer, Magnús M. Halldórsson, Emo Welzl:
Capacity of Arbitrary Wireless Networks.
1872-1880
- Urs Niesen, Piyush Gupta, Devavrat Shah:
The Multicast Capacity Region of Large Wireless Networks.
1881-1889
- Giuseppa Alfano, Michele Garetto, Emilio Leonardi:
Capacity Scaling of Wireless Networks with Inhomogeneous Node Density: Lower Bounds.
1890-1898
Error Correction,
Wireless
Security 7
- Etienne Perron, Suhas N. Diggavi, Emre Telatar:
On Cooperative Wireless Network Secrecy.
1935-1943
- Toby Xu, Ying Cai:
Location Cloaking for Safety Protection of Ad Hoc Networks.
1944-1952
- Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu:
ACTION: Breaking the Privacy Barrier for RFID Systems.
1953-1961
- Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, Jihyuk Choi:
Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks.
1962-1970
Multicasting
Scheduling
MAC 2
- Seung-Jae Han, Thyaga Nandagopal, Yigal Bejerano, Hyoung-Gyu Choi:
Analysis of Spatial Unfairness in Wireless LANs.
2043-2051
- Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edward W. Knightly:
Synchronized CSMA Contention: Model, Implementation and Evaluation.
2052-2060
- Joseph Naor, Danny Raz, Gabriel Scalosub:
Toward Optimal Utilization of Shared Random Access Channels.
2061-2069
- Yu Cheng, Xinhua Ling, Weihua Zhuang:
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols.
2070-2078
Ad Hoc 3
Cooperative Networks,
Wireless
Sensor Networks 7
- Animashree Anandkumar, Meng Wang, Lang Tong, Ananthram Swami:
Prize-Collecting Data Fusion for Cost-Performance Tradeoff in Distributed Inference.
2150-2158
- Bo Yu, Jiangchuan Li, Yong Li:
Distributed Data Aggregation Scheduling in Wireless Sensor Networks.
2159-2167
- Changlei Liu, Guohong Cao:
Minimizing the Cost of Mine Selection Via Sensor Networks.
2168-2176
- Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Identity Aware Sensor Networks.
2177-2185
Security 8
- Adel El-Atawy, Ehab Al-Shaer:
Building Covert Channels over the Packet Reordering Phenomenon.
2186-2194
- Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind Detection of Spread Spectrum Flow Watermarks.
2195-2203
- Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness B. Shroff:
TCP/IP Timing Channels: Theory to Implementation.
2204-2212
- Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding.
2213-2221
Multicasting,
Wireless
Backend Services
- Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Link Gradients: Predicting the Impact of Network Latency on Multitier Applications.
2258-2266
- Ho-Lin Chen, Jason R. Marden, Adam Wierman:
On the Impact of Heterogeneity and Back-End Scheduling in Load Balancing Designs.
2267-2275
- Dan Li, Chuanxiong Guo, Haitao Wu, Kun Tan, Songwu Lu:
FiConn: Using Backup Port for Server Interconnection in Data Centers.
2276-2285
- Hongbo Jiang, Arun Iyengar, Erich M. Nahum, Wolfgang Segmuller, Asser N. Tantawi, Charles P. Wright:
Load Balancing for SIP Server Clusters.
2286-2294
MAC 3
- Senhua Huang, Xin Liu, Zhi Ding:
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access.
2295-2303
- Juncheng Jia, J. Jun Jun Zhang, Qian Zhang:
Cooperative Relay for Cognitive Radio Networks.
2304-2312
- Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Choi, Robert Grant, Hyrum K. Wright, Ketan Mandke, Robert C. Daniels, Robert W. Heath Jr., Scott Nettles:
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems.
2313-2321
- Haythem Bany Salameh, Marwan Krunz, Ossama Younis:
Dynamic Spectrum Access Protocol Without Power Mask Constraints.
2322-2330
Ad Hoc 4
Wireless,
Sensor Networks
Sensor Networks 8
- Zheng Yang, Yunhao Liu, Xiang-Yang Li:
Beyond Trilateration: On the Localizability of Wireless Ad-Hoc Networks.
2392-2400
- Yue Wang, Sol Lederer, Jie Gao:
Connectivity-Based Sensor Network Localization with Incremental Delaunay Refinement Method.
2401-2409
- Liang Zhang, Shigang Chen, Ying Jian, Yuguang Fang:
Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks.
2410-2418
- Mo Li, Yunhao Liu, Jiliang Wang, Zheng Yang:
Sensor Network Navigation without Locations.
2419-2427
Security 9
- Feng Li, Jie Wu, Anand Srinivasan:
Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets.
2428-2436
- Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Boutaba:
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks.
2437-2445
- Fabio Soldo, Athina Markopoulou, Katerina J. Argyraki:
Optimal Filtering of Source Address Prefixes: Models and Algorithms.
2446-2454
- Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao:
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses.
2455-2463
Protocols,
Wireless
Algorithms
- Josef Kanizo, David Hay, Isaac Keslassy:
Optimal Fast Hashing.
2500-2508
- Mohammad Behdadfar, Hossein Saidi, Hamid Alaei, Babak Samari:
Scalar Prefix Search: A New Route Lookup Algorithm for Next Generation Internet.
2509-2517
- Haoyu Song, Fang Hao, Murali S. Kodialam, T. V. Lakshman:
IPv6 Lookups using Distributed and Load Balanced Bloom Filters for 100Gbps Core Router Line Cards.
2518-2526
- Etienne Perron, Dinkar Vasudevan, Milan Vojnovic:
Using Three States for Binary Consensus on Complete Graphs.
2527-2535
Ad Hoc Mobile Networks 1
- Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:
Capacity of Multi-Hop Wireless Networks with Incomplete Traffic Specification.
2536-2540
- Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen:
AAA: Asynchronous, Adaptive, and Asymmetric Power Management for Mobile Ad Hoc Networks.
2541-2545
- Zhiqiang Li, F. Richard Yu, Minyi Huang:
A Cooperative Spectrum Sensing Consensus Scheme in Cognitive Radios.
2546-2550
- Lifeng Sang, Anish Arora:
Capabilities of Low-Power Wireless Jammers.
2551-2555
- Xiaoyuan Ta, Guoqiang Mao, Brian D. O. Anderson:
On the Properties of Giant Component in Wireless Multi-Hop Networks.
2556-2560
QoS Provisionings and Evaluations
Content Distribution and Delay/Disruption Tolerance Networks
Broadband Access Technologies
- Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, Shugong Xu, Songwu Lu:
Proportional Fair Frequency-Domain Packet Scheduling for 3GPP LTE Uplink.
2611-2615
- Jin Teng, Changqing Xu, Weijia Jia, Dong Xuan:
D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks.
2616-2620
- Sriram Lakshmanan, Karthikeyan Sundaresan, Ravi Kokku, A. Khojestepour, Sampath Rangarajan:
Towards Adaptive Beamforming in Indoor Wireless Networks: An Experimental Approach.
2621-2625
- Thomas Bonald, Ali Ibrahim, James Roberts:
Enhanced Spatial Reuse in Multi-Cell WLANs.
2626-2630
Network Control and Management 1