Default Cover Image

2014 IFIP Networking Conference

June 2 2014 to June 4 2014

Trondheim, Norway

Table of Contents

MaxiNet: Distributed emulation of software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
TRANSIT: Supporting transitions in Peer-to-Peer live video streamingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A cascading framework for uncovering spammers in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On bufferbloat and delay analysis of multipath TCP in wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
GPS: A method for data sharing in Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Privacy and integrity preserving multi-dimensional range queries for cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A storage-free data parasitizing scheme for wireless body area networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
CREATE: Correlation enhanced traffic matrix estimation in Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
DROid: Adapting to individual mobility pays off in mobile data offloadingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A distributed infrastructure to analyse SIP attacks in the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Can SPDY really make the web faster?Full-text access may be available. Sign in or learn about subscription options.pp. 1-9
Understanding the topological properties of Internet traffic: A view from the edgeFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On the quality of BGP route collectors for iBGP policy inferenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Paid prioritization and its impact on net neutralityFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Socially-aware caching strategy for content centric networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Distributed storage in the planeFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Policy-compliant virtual network embeddingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Measuring the degree distribution of routers in the core internetFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Hybrid multicast-unicast streaming over mobile networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Differential games of competition in online content diffusionFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Linking network usage patterns to traffic Gaussianity fitFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Understanding HTTP flow rates in cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On the performance of the LISP beta networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A first look at 802.11ac in action: Energy efficiency and interference characterizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Interference identification and resource management in OFDMA femtocell networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Approximating the optimal weights for discrete-time generalized processor sharingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Analyzing anomalies in anonymized SIP trafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
When AIMD meets ICN: A bandwidth sharing perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Game theoretic framework for power control in intercell interference coordinationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Economics of traffic attraction by transit providersFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Understanding mobile Internet usage behaviorFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Virtual network migration on real infrastructure: A PlanetLab case studyFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Price competition between road side units operators in vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A measurement study on the application-level performance of LTEFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On the trade-off between cost and availability of virtual networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On the scalability of interdomain path computationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On the controller placement for designing a distributed SDN control layerFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Migrating to Ipv6 — The role of basic coordinationFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
CQNCR: Optimal VM migration planning in cloud data centersFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
pWeb: A personal interface to the world wide webFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Coordinated fair resource sharing in dense indoor wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On the topology maintenance of dynamic P2P overlays through self-healing local interactionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
On the state of OSN-based Sybil defensesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Dynamic overload balancing in server farmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Characterizing Mobile Open APIs in smartphone appsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
NetSearch: Googling large-scale network management dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Hybrid spectrum sharing through adaptive spectrum handoff for cognitive radio networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Showing 55 out of 55