Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IFIP-NETWORKING
IFIP-NETWORKING 2014
Generate Citations
2014 IFIP Networking Conference
June 2 2014 to June 4 2014
Trondheim, Norway
Table of Contents
MaxiNet: Distributed emulation of software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Philip Wette
,
Martin Draxler
,
Arne Schwabe
TRANSIT: Supporting transitions in Peer-to-Peer live video streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Matthias Wichtlhuber
,
Bjorn Richerzhagen
,
Julius Ruckert
,
David Hausheer
A cascading framework for uncovering spammers in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Zejia Chen
,
Jiahai Yang
,
Jessie Hui Wang
On bufferbloat and delay analysis of multipath TCP in wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yung-Chih Chen
,
Don Towsley
GPS: A method for data sharing in Mobile Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Bo Fan
,
Supeng Leng
,
Kun Yang
,
Qiang Liu
Privacy and integrity preserving multi-dimensional range queries for cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Fei Chen
,
Alex X. Liu
Robust confidentiality preserving data delivery in federated coalition networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Lu Su
,
Yunlong Gao
,
Fan Ye
,
Peng Liu
,
Oktay Gunluk
,
Tom Bcrman
,
Seraphin Calo
,
Tarek Abdelzaher
A storage-free data parasitizing scheme for wireless body area networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yuan-Yao Shih
,
Ai-Chun Pang
,
Pi-Cheng Hsiu
CREATE: Correlation enhanced traffic matrix estimation in Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Zhiming Hu
,
Yan Qiao
,
Jun Luo
,
Peng Sun
,
Yonggang Wen
DROid: Adapting to individual mobility pays off in mobile data offloading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Filippo Rebecchi
,
Marcelo Dias de Amorim
,
Vania Conan
A distributed infrastructure to analyse SIP attacks in the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Adnan Aziz
,
Dirk Hoffstadt
,
Erwin Rathgeb
,
Thomas Dreibholz
Can SPDY really make the web faster?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yehia Elkhatib
,
Gareth Tyson
,
Michael Welzl
Understanding the topological properties of Internet traffic: A view from the edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Juan Antonio Cordero
,
Olivier Bonaventure
On the quality of BGP route collectors for iBGP policy inference
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Luca Cittadini
,
Stefano Vissicchio
,
Benoit Donnet
Paid prioritization and its impact on net neutrality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jingjing Wang
,
Richard T. B. Ma
,
Dah Ming Chiu
Socially-aware caching strategy for content centric networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Cesar Bernardini
,
Thomas Silverston
,
Olivier Festor
Distributed storage in the plane
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Eitan Altman
,
Konstantin Avrachenkov
,
Jasper Goseling
Policy-compliant virtual network embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
David Dietrich
,
Panagiotis Papadimitriou
Measuring the degree distribution of routers in the core internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Matthieu Latapy
,
Elie Rotenberg
,
Christophe Crespelle
,
Fabien Tarissan
Hybrid multicast-unicast streaming over mobile networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Md. Mahfuzur Rahman
,
Cheng-Hsin Hsu
,
Abdul Hasib
,
Mohamed Hefeeda
Differential games of competition in online content diffusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Francesco De Pellegrini
,
Alexandre Reiffers
,
Eitan Altman
Linking network usage patterns to traffic Gaussianity fit
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ricardo de O. Schmidt
,
Ramin Sadre
,
Nikolay Melnikov
,
Jurgen Schonwalder
,
Aiko Pras
We are all treated equal, aren't we? — Flow-level performance as a function of flow size
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Muhammad Amir Mehmood
,
Anja Feldmann
,
Steve Uhlig
,
Walter Willinger
Understanding HTTP flow rates in cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ying Zhang
,
Ake Arvidsson
,
Matti Siekkinen
,
Guillaume Urvoy-Keller
On the performance of the LISP beta network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Florin Coras
,
Damien Saucez
,
Luigi Iannone
,
Benoit Donnet
A first look at 802.11ac in action: Energy efficiency and interference characterization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yunze Zeng
,
Parth H. Pathak
,
Prasant Mohapatra
Interference identification and resource management in OFDMA femtocell networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Chin-Jung Liu
,
Pei Huang
,
Li Xiao
,
Abdol-Hossein Esfahanian
Approximating the optimal weights for discrete-time generalized processor sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jasper Vanlerberghe
,
Joris Walraevens
,
Tom Maertens
,
Herwig Bruneel
Analyzing anomalies in anonymized SIP traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jan Stanek
,
Lukas Kencl
,
Jiri Kuthan
When AIMD meets ICN: A bandwidth sharing perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Damien Saucez
,
Ilaria Cianci
,
Luigi Alfredo Grieco
,
Chadi Barakat
Game theoretic framework for power control in intercell interference coordination
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Kinda Khawam
,
Amine Adouane
,
Samer Lahoud
,
Johanne Cohen
,
Samir Tohme
Economics of traffic attraction by transit providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Pradeep Bangera
,
Sergey Gorinsky
Understanding mobile Internet usage behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Xueli An
,
Gerald Kunzmann
Virtual network migration on real infrastructure: A PlanetLab case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Samantha Lo
,
Mostafa Ammar
,
Ellen Zegura
,
Marwan Fayed
Price competition between road side units operators in vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Vladimir Fux
,
Patrick Maille
,
Matteo Cesana
A measurement study on the application-level performance of LTE
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Nico Becker
,
Amr Rizk
,
Markus Fidler
Peering vs transit: A game theoretical model for autonomous systems connectivity
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Giovanni Accongiagioco
,
Eitan Altman
,
Enrico Gregori
,
Luciano Lenzini
On the trade-off between cost and availability of virtual networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Sandra Herker
,
Wolfgang Kiess
,
Xueli An
,
Andreas Kirstadter
On the scalability of interdomain path computations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Onur Ascigil
,
Kenneth L. Calvert
,
James N. Griffioen
On the controller placement for designing a distributed SDN control layer
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yury Jimenez
,
Cristina Cervello-Pastor
,
Aurelio J. Garcia
A study on traceroute potentiality in revealing the Internet AS-level topology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Adriano Faggiani
,
Enrico Gregori
,
Alessandro Improta
,
Luciano Lenzini
,
Valerio Luconi
,
Luca Sani
Migrating to Ipv6 — The role of basic coordination
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Mehdi Nikkhah
,
Roch Guerin
CQNCR: Optimal VM migration planning in cloud data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Md. Faizul Bari
,
Mohamed Faten Zhani
,
Qi Zhang
,
Reaz Ahmed
,
Raouf Boutaba
pWeb: A personal interface to the world wide web
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Reaz Ahmed
,
Shihabur Rahman Chowdhury
,
Alexander Pokluda
,
Md. Faizul Bari
,
Raouf Boutaba
,
Bertrand Mathieu
TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in Content-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Wei Quan
,
Changqiao Xu
,
Athanasios V. Vasilakos
,
Jianfeng Guan
,
Hongke Zhang
,
Luigi Alfredo Grieco
SWAP: Security aware provisioning and migration of phone clones over mobile clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Seyed Yahya Vaezpour
,
Rui Zhang
,
Kui Wu
,
Jianping Wang
,
Gholamali C Shoja
Coordinated fair resource sharing in dense indoor wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ying Wang
,
Jun Zhang
,
Jason Min Wang
,
Brahim Bensaou
Optimal performance trade-offs in MAC for wireless sensor networks powered by heterogeneous ambient energy harvesting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yunye Jin
,
Hwee-Pink Tan
On the topology maintenance of dynamic P2P overlays through self-healing local interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Stefano Ferretti
An optimal Cache management framework for information-centric networks with network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jin Wang
,
Jing Ren
,
Kejie Lu
,
Jianping Wang
,
Shucheng Liu
,
Cedric Westphal
On the state of OSN-based Sybil defenses
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
David Koll
,
Jun Li
,
Joshua Stein
,
Xiaoming Fu
Dynamic overload balancing in server farms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Chih-ping Li
,
Georgios S. Paschos
,
Leandros Tassiulas
,
Eytan Modiano
Characterizing Mobile Open APIs in smartphone apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Li Zhang
,
Chris Stover
,
Amanda Lins
,
Chris Buckley
,
Prasant Mohapatra
NetSearch: Googling large-scale network management data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Tongqing Qiu
,
Zihui Ge
,
Dan Pei
,
Jia Wang
,
Jun Jim Xu
Hybrid spectrum sharing through adaptive spectrum handoff for cognitive radio networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Adisorn Lertsinsrubtavee
,
Naceur Malouch
,
Serge Fdida
Showing 55 out of 55