30
27 th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE Catalog Number: CFP08INF-PRT ISBN: 978-1-4244-2025-4

27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

  • Upload
    others

  • View
    35

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

27th IEEE Conference on Computer Communications (INFOCOM)

Phoenix, Arizona 15-17 April 2008 IEEE Catalog Number: CFP08INF-PRT ISBN: 978-1-4244-2025-4

Page 2: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xix

Table of Contents On Optimal Pricing for Tiered-Service Networks.......................................................................1 Qian Lv, North Carolina State University, USA; and George N. Rouskas, North Carolina State University, USA Maximum Coverage at Minimum Cost for Multi-Domain IP/MPLS Networks. .....................6 Marcelo Yannuzzi, Technical University of Catalonia, Spain; Xavier Masip-Bruin, Technical University of Catalonia, Spain; Rene Serral-Gracià, Technical University of Catalonia, Spain; Eva Marin-Tordera, Technical University of Catalonia, Spain; Alex Sprintson, Texas A&M University, USA; and Ariel Orda, Technion, Israel Institute of Technology, Israel Non-Metric Coordinates for Network Proximity Prediction....................................................11 Peter Key, Microsoft Research, UK; Laurent Massoulié, Thomson, France; and Dan-Cristian Tomozei, Thomson, France Detecting Anomalies Using End-to-End Path Measurements ..................................................16 K. V. M. Naidu, Bell Labs Research Inda, Bangalore, India; Debmalya Panigrahi, MIT, USA; and Rajeev Rastogi, Bell Labs Research Inda, Bangalore, India Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc Networks....................................21 Hermann S. Lichte, University of Paderborn, Germany; Stefan Valentin, University of Paderborn, Germany; Holger Karl, University of Paderborn, Germany; Imad Aad, Docomo Euro-Labs, Germany; Luis Loyola, Docomo Euro-Labs, Germany; and Joerg Widmer, Docomo Euro-Labs, Germany Residual Link Lifetime Prediction with Limited Information Input in Mobile Ad Hoc Networks .........................................................26 Zygmunt J. Haas, Cornell University, U.S.A.; and Edward Y. Hua, Cornell University, U.S.A. Robust Distributed Spectrum Sensing in Cognitive Radio Networks .....................................31 Ruiliang Chen, Virginia Tech, USA; Jung-Min Park, Virginia Tech, USA; and Kaigui Bian, Virginia Tech, USA Spectrum Sharing in Cognitive Radio Networks.......................................................................36 Fan Wang, University of Arizona, USA; Marwan Krunz, University of Arizona, USA; and Shuguang Cui, Texas A & M University, USA Power-Adjusted Random Access to a Wireless Channel ..........................................................41 Young-June Choi, University of Michigan, USA; and Kang G. Shin, University of Michigan, USA A Game-theoretic Analysis of QoS in Wireless MAC ...............................................................46 Pavan Nuggehalli, Vanu, Inc., USA; Mahasweta Sarkar, San Diego State University, USA; Kishor Kulkarni, Wipro Technologies, India; and Ramesh R. Rao, University of California San Diego, USA Optimizing Distributed MAC Protocol for Ultra-wide Band Wireless Networks..................51 Lin X. Cai, University of Waterloo, Canada; Lin Cai, University of Victoria, Canada; Xuemin Shen, University of Waterloo, Canada; and Jon W. Mark, University of Waterloo, Canada

Page 3: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xx

Exploiting Multi-Channel Diversity in Spectrum-Agile Networks ..........................................56 Alexander W. Min, The University of Michigan, U.S.A.; and Kang G. Shin, The University of Michigan, U.S.A. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems................61 Xun Wang, The Ohio State University, USA; Wei Yu, Texas A&M University, USA; Xinwen Fu, Dakota State University, USA; Dong Xuan, The Ohio State University, USA; and Wei Zhao, Rensselaer Polytechnic Institute, USA Cyber-Fraud is One Typo Away .................................................................................................66 Anirban Banerjee, University of California, Riverside, USA; Dhiman Barman, University of California, Riverside, USA; Michalis Faloutsos, University of California, Riverside, USA; and Laxmi N. Bhuyan, University of California, Riverside, USA A New Perspective on Internet Security Using Insurance ........................................................71 Jean C. Bolot, Sprint, USA; and Marc Lelarge, INRIA-ENS, France A Novel Quantitative Approach for Measuring Network Security .........................................76 Mohammad Salim Ahmed, The University of Texas at Dallas, USA; Ehab Al-Shaer, DePaul University, USA; and Latifur Khan, The University of Texas at Dallas, USA Task Scheduling and Lightpath Establishment in Optical Grids ............................................81 Xin Liu, SUNY at Buffalo, USA; Wei Wei, SUNY at Buffalo, USA; Chunming Qiao, SUNY at Buffalo, USA; Ting Wang, NEC Laboratories America, USA; Weisheng Hu, State Key Lab of Advanced Optical Communication Systems and Networks, China;Wei Guo, State Key Lab of Advanced Optical Communication Systems and Networks, China; and Min-You Wu, State Key Lab of Advanced Optical Communication Systems and Networks, China Methods of Optimizing ULH Transient-Constrained Wavelength Assignment.....................86 Guangzhi Li, AT&T, USA; Angela Chiu, AT&T, USA; Robert Doverspike, AT&T, USA; Martin Birk, AT&T, USA; Don Husa, AT&T, USA; and Nick Zanki, AT&T, USA Linear Non-cooperative Games with Linearly Coupled Constraints: Theory and Application ...............................................................................................................91 Quanyan Zhu, University of Toronto, Canada; and Lacra Pavel, University of Toronto, Canada A Three-Stage Load-Balancing Switch ......................................................................................96 Xiaolin Wang, Analog Devices Inc., USA; Yan Cai, University of MassachusettsAmherst, USA; Sheng Xiao, University of Massachusetts Amherst, USA; and Weibo Gong, University of Massachusetts Amherst, USA The Kraft's Inequality of Scheduling for Packet-Switched Clos Network............................101 Tony T. Lee, The Chinese University of Hong Kong, Hong Kong Limit Theorems and Lifetime in Large Sensor Networks ......................................................106 Gabriel Paillard, Universidade Federal do Ceara, Brazil; and Vlady Ravelomanana, University of Paris Nord, France A Novel On-Demand Framework for Collaborative Objection Detection in Sensor Networks.....................................................................................................................111 Guanqun Yang, Iowa State University, USA; Vinod Shukla, Iowa State University, USA; and Daji Qiao, Iowa State University, USA

Page 4: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxi

Towards Energy-optimal and Reliable Data Collection via Collision-free Scheduling in Wireless Sensor Networks .................................................................................116 Huang Lee, Stanford University, USA; and Abtin Keshavarzian, Bosch RTC, USA Cross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks ..........................................................................121 Tommaso Melodia, State University of New York at Buffalo, USA; and Ian F. Akyildiz, Georgia Institute of Technology, USA Singlehop Collaborative Feedback Primitives for Wireless Sensor Networks .....................126 Murat Demirbas, University at Buffalo, SUNY, USA; Onur Soysal, University at Buffalo, SUNY, USA; and Muzammil Hussain, University at Buffalo, SUNY, USA A New ACK Policy to Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices .....131 Haithem Al-Mefleh, Iowa State University, USA; and J. Morris Chang, Iowa State University, USA An Empirical Activity Model for WLAN Users ......................................................................136 Caleb Phillips, University of Colorado, USA; and Suresh Singh, Portland State University, USA Opportunistic Waiver of Data Reception for Exploiting Multiuser Diversity in the Uplink of IEEE 802.11 WLAN............................................................................................141 Seong-Il Hahm, Seoul National University, Korea; Jong-Won Lee, Handong Global University, Korea; and Chong-Kwon Kim, Seoul National University, Korea SNR-Guided Rate Adaptation for IEEE 802.11 Wireless Networks .....................................146 Jiansong Zhang, Microsoft Research Asia, P.R.China; Kun Tan, Microsoft Research Asia, P.R.China; Jun Zhao, Microsoft Research Asia, P.R.China; Haitao Wu, Microsoft Research Asia, P.R.China; and Yongguang Zhang, Microsoft Research Asia, P.R.China Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANs ............................................................................................................................151 Yigal Bejerano, Bell-Labs, Alcatel-Lucent, U.S.A.; Dongwook Lee, Samsung Tech., Korea; Prasun Sinha, CSE, Ohio-State University, U.S.A.; and Lisa Zhang, Bell-Labs, Alcatel-Lucent, U.S.A. Delay Tolerant Collaborations Among Campus-wide Wireless Users ..................................156 Xuwen Yu, University of Notre Dame, USA; and Surendar Chandra, University of Notre Dame, USA DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile Computing......................................................................................................................161 Quan Yuan, Florida Atlantic University, USA; and Jie Wu, Florida Atlantic University, USA Information Concealing Games ................................................................................................166 Saswati Sarkar, university of Pennsylvania, united states; Eitan Altman, INRIA, FRANCE; Rachid El-Azouzi, LIA/University of Avignon, FRANCE; and Yezekael Hayel, LIA/University of Avignon, FRANCE

Page 5: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxii

SVATS: A Sensor-network-based Vehicle Anti-Theft System ...............................................171 Hui Song, Frostburg State University, USA; Sencun Zhu, The Pennsylvania State University, USA; and Guohong Cao, The Pennsylvania State University, USA Spatial Signatures for Lightweight Security in Wireless Sensor Networks ..........................176 Lifeng Sang, The Ohio State University, USA; and Anish Arora, The Ohio State University, USA ACK-Clock Dynamics: Modeling the Interaction between Windows and the Network......181 Krister Jacobsson, KTH, Sweden; Lachlan L. H. Andrew, California Institute of Technology, USA; Ao Tang, Cornell University, USA; Karl H. Johansson, KTH, Sweden; Håkan Hjalmarsson, KTH, Sweden; and Steven H. Low, California Institute of Technology, USA Maximal Recovery Network Coding under Topology Constraint .........................................186 Kiran Misra, Michigan State University, USA; Shirish Karande, Michigan State University, USA; and Hayder Radha, Michigan State University, USA Is Random Network Coding Helpful in WiMAX? ..................................................................191 Jin Jin, University of Toronto, Canada; Baochun Li, University of Toronto, Canada; and Taegon Kong, LG Electronics, Inc., Republic of Korea Reliability Gain of Network Coding in Lossy Wireless Networks .........................................196 Majid Ghaderi, University of Calgary, Canada; Don Towsley, University of Massachusetts Amherst, USA; and Jim Kurose, University of Massachusetts Amherst, USA Making Large Scale Deployment of RCP Practical for Real Networks ................................201 Chia-Hui Tai, Stanford University, USA; Jiang Zhu, Stanford University, USA and Nandita Dukkipati, Stanford University, USA A Decomposition Method for Transmission Scheduling in Multi-channel Wireless Sensor Networks .........................................................................................................206 Ioannis C. Paschalidis, Boston University, USA; Wei Lai, Boston University, USA; and Xiangdong Song, Boston University, USA Scalable Localization with Mobility Prediction for Underwater Sensor Networks .............211 Zhong Zhou, University of Connecticut, USA; Jun-Hong Cui, University of Connecticut, USA; and Amvrossios Bagtzoglou, University of Connecticut, USA Asynchronous Sampling Benefits Wireless Sensor Networks ................................................216 Jing Wang, University of Texas at Arlington, USA; Yonghe Liu, University of Texas at Arlington, USA; and Sajal K. Das, University of Texas at Arlington, USA Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks .........221 Guanqun Yang, Iowa State University, USA; Bin Tong, Iowa State University, USA; Daji Qiao, Iowa State University, USA; and Wensheng Zhang, Iowa State University, USA Utility-Driven Spatiotemporal Sampling using Mobile Sensor Networks.............................226 Yang Yu, Motorola Labs, USA; and Loren J. Rittle, Motorola Labs, USA

Page 6: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxiii

Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks...................................................................................................231 Alessandro Mei, Sapienza University of Rome, Italy; and Julinda Stefa, Sapienza University of Rome, Italy Location-Dependent Network Performance and Design Strategies in Wireless Mesh Networks ...........................................................................................................................236 Tehuang Liu, National Taiwan University, Taiwan; and Wanjiun Liao, National Taiwan University, Taiwan An Optimisation Framework for Practical Multipath Routing in Wireless Mesh Networks ...........................................................................................................................241 Bozidar Radunovic, Microsoft Research Cambridge, UK; Christos Gkantsidis, Microsoft Research Cambridge, UK; Peter Key, Microsoft Research Cambridge, UK; and Pablo Rodriguez, Telefonica Research, Spain A New Channel Assignment Mechanism for Rural Wireless Mesh Networks .....................246 Partha Dutta, IBM India Research Lab, India; Sharad Jaiswal, Bell Labs Research India, Alcatel-Lucent , India; Debmalya Panigrahi, MIT, USA; and Rajeev Rastogi, Bell Labs Research India, Alcatel-Lucent , India DSCM: An Energy-Efficient and Rate-Optimal Multicast Protocol for Multihop Wireless Networks Using Distributed Source Coding............................................251 Mina Sartipi, University of Tennessee at Chattanooga, USA; Badri N. Vellambi, Georgia Institute of Technology, USA; Nazanin Rahnavard, Oklahoma State University, USA; and Faramarz Fekri, Georgia Institute of Technology, USA Joint Traffic Routing and Distribution of Security Services in High Speed Networks........256 Andreas Hess, Technical University Berlin, Germany; Sudipta Sengupta, Microsoft Research, USA; and Vijay P. Kumar, VPK Technologies, USA L+1-MWM: A Fast Pattern Matching Algorithm for High-Speed Packet Filtering ...........261 Yoon-Ho Choi, Seoul National University, Korea; Moon-Young Jung, Seoul National University, Korea; and Seung-Woo Seo, Seoul National University, Korea Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks......266 Udi Ben-Porat, Tel-Aviv University, Israel; Anat Bremler-Barr, Interdisciplinary Center, Herzliya, Israel; and Hanoch Levy, ETH Zurich, Switzerland Spatial-Temporal Characteristics of Internet Malicious Sources..........................................271 Zesheng Chen, Florida International University, USA; Chuanyi Ji, Georgia Institute of Technology, USA; and Paul Barford, University of Wisconsin-Madison, USA DAWN: A Novel Strategy for Detecting ASCII Worms in Networks ...................................276 Parbati Kumar Manna, University of Florida, USA; Sanjay Ranka, University of Florida, USA; and Shigang Chen, University of Florida, USA Maximizing Restorable Throughput in MPLS Networks.......................................................281 Reuven Cohen, Technion - Israel Institute of Technology, Israel; and Gabi Nakibly, Technion - Israel Institute of Technology, Israel

Page 7: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxiv

A Full Route Aware Routing Protocol -- Fast Recovery from Transient Routing Failures........................................................................................................286 Feng Wang, Liberty University, USA; and Lixin Gao, University of Massachusetts, Amherst, USA Policy-Aware Topologies for Efficient Inter-Domain Routing Evaluations .........................291 Yihua He, Yahoo! Inc, USA; Michalis Faloutsos, UC Riverside, USA; Srikanth V. Krishnamurthy, UC Riverside, USA; and Marek Chrobak, UC Riverside, USA A Distributed Minimum-Distortion Routing Algorithm with In-Network Data Processing......................................................................................................296 Ramin Khalili, University of Massachussets, Amherst, USA; and Jim Kurose, University of Massachussets, Amherst, USA Designing a Fault-Tolerant Network with Valiant Load-Balancing......................................301 Rui Zhang-Shen, Princeton University, United States; and Nick McKeown, Stanford University, United States Cooperative Routing in Multi-Source Multi-Destination Multi-hop Wireless Networks ......................................................................................................................306 Jin Zhang, Hong Kong University of Science and Technology, hong kong,PRC; and Qian Zhang, Hong Kong University of Science and Technology, hong kong,PRC On A Non-Linear Optimization Approach For Proportional Fairness in Ad-hoc Wireless Networks.........................................................................................................311 Nikhil Singh, University of Illinois at Urbana Champaign, USA; and Ramavarapu S. Sreenivas, University of Illinois at Urbana-Champaign, USA Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks ........................................................................................................316 Song Luo, Intelligent Automation Inc, USA; Jason H. Li, Intelligent Automation Inc, USA; Kihong Park, Purdue University, USA; and Renato Levy, Intelligent Automation Inc, USA Beyond Proportional Fairness: A Resource Biasing Framework for Shaping Wireless Network Throughput Profiles.....................................................................321 Sumit Singh, University of California, Santa Barbara, USA; Upamanyu Madhow, University of California, Santa Barbara, USA; and Elizabeth M. Belding, University of California, Santa Barbara, USA Resource Allocation for Downlink Statistical Multiuser QoS Provisionings in Cellular Wireless Networks...................................................................................................326 Qinghe Du, Texas A&M University, USA; and Xi Zhang, Texas A&M University, USA State-dependent Proportional Fair Scheduling Algorithms for Wireless Forward Link Data Services......................................................................................................331 Jung-Tsung Tsai, National Taiwan Normal University, Taiwan QoS Performance Analysis of Cognitive Radio-based Virtual Wireless Networks..............336 Brent Ishibashi, University of Waterloo, Canada; Nizar Bouabdallah, INRIA, France; and Raouf Boutaba, University of Waterloo, Canada

Page 8: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxv

On Unexpected Power Control Modes and their Impact on Frame Loss in 802.11b/g Outdoor Links ...........................................................................................................341 Domenico Giustiniano, University of Rome, Tor Vergata, Italy; Giuseppe Bianchi, University of Rome, Tor Vergata, Italy; Luca Scalia, University of Palermo, Italy; and Ilenia Tinnirello, University of Palermo, Italy Empirical Performance Evaluation of A Channel Characteristics-Aware Routing Protocol.........................................................................................................................346 Rupa Krishnan, Stonybrook University, U.S.A; Ashish Raniwala, Stonybrook University, U.S.A; and Tzi-cker Chiueh, Stonybrook University, U.S.A BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks .................................351 Deke Guo, College of Information Systems and Management, National University of Defense Technology, Changsha, China; Yunhao Liu, Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China; and Xiangyang Li, Department of Computer Science, Illinois Institute of Technology, Chicago, USA Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach ..................................................................................................356 Bin Chang, Vanderbilt University, USA; Yi Cui, Vanderbilt University, USA; and Yuan Xue, Vanderbilt University, USA Exploiting the Properties of Query Workload and File Name Distributions to Improve P2P Synopsis-based Searches ......................................361 William Acosta, University of Notre Dame, USA; and Surendar Chandra, University of Notre Dame, USA DigOver: Towards Distributed & Collaborative Overlay Fault Diagnosis Based On User-level Belief Revision ....................................................................................................366 Yongning Tang, Illinois State University, USA; and Ehab Al-shaer, DePaul University, USA SpimRank: A New Anti-SPIM Method based on Trust and Reputation Mechanisms........371 Jun Bi, Tsinghua University, China; Jianping Wu, Tsinghua University, China; and Wenmao Zhang, Tsinghua University, China Theoretical Results on Base Station Movement Problem for Sensor Networks ...................376 Yi Shi, Virginia Tech, USA; and Y. Thomas Hou, Virginia Tech, USA Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty Traffic ...........385 Michael J. Neely, University of Southern California, USA Connectivity and Latency in Large-Scale Wireless Networks with Unreliable Links .........394 Zhenning Kong, Yale University, USA; and Edmund M. Yeh, Yale University, USA The Speed of Information Propagation in Large Wireless Networks ...................................403 Yi Xu, North Carolina State University, USA; and Wenye Wang, North Carolina State University, USA

Page 9: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxvi

A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network ..................................................................................................................412 Jin Cao, Bell Laboratories, Alcatel-Lucent, USA; Aiyou Chen, Bell Laboratories, Alcatel-Lucent, USA; and Tian Bu, Bell Laboratories, Alcatel-Lucent, USA Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method .......................................................................................................................421 Chengchen Hu, Tsinghua University, China; Sheng Wang, Tsinghua University, China; Jia Tian, Tsinghua University, China; Bin Liu, Tsinghua University, China; Yu Cheng, Illinois Institute of Technology, US; and Yan Chen, Northwestern University, US Turbo King: Framework for Large-Scale Internet Delay Measurements ............................430 Derek Leonard, Texas A&M University, USA; and Dmitri Loguinov, Texas A&M University, USA Network Routing Topology Inference from End-to-End Measurements..............................439 Jian Ni, Yale University, USA; Haiyong Xie, Yale University, USA; Sekhar Tatikonda, Yale University, USA; and Yang Richard Yang, Yale University, USA Attack-Tolerant Time-Synchronization in Wireless Sensor Networks .................................448 Xin Hu, The University of Michigan, United States; Taejoon Park, Samsung Electronics, Korea; and Kang G. Shin, The University of Michigan, United States Verifiable Privacy-Preserving Range Query in Sensor Networks .........................................457 Bo Sheng, College of William and Mary, USA; and Qun Li, College of William and Mary, USA Towards Statistically Strong Source Anonymity for Sensor Networks.................................466 Min Shao, The Pennsylvania State University, USA; Yi Yang, The Pennsylvania State University, USA; Sencun Zhu, The Pennsylvania State University, USA; and Guohong Cao, The Pennsylvania State University, USA Confidentiality Protection Schemes for Data Aggregation in Sensor Networks ..................475 Taiming Feng, Iowa State University, USA; Chuang Wang, Iowa State University, USA; Wensheng Zhang, Iowa State University, USA; and Lu Ruan, Iowa State University, USA On the Feasibility of the Link Abstraction in (Rural) Mesh Networks .................................484 Dattatraya Gokhale, Indian Navy, India; Sayandeep Sen, University of Wisconsin Madison, U.S.A.; Kameswari Chebrolu, Indian Institute of Technology Bombay, India; and Bhaskaran Raman, Indian Institute of Technology Bombay, India iPack: in-Network Packet Mixing for High Throughput Wireless Mesh Networks ...........................................................................................................................493 Richard Alimi, Yale University, USA; Li Li, Bell Labs, USA; Ramachandran Ramjee, Microsoft Research India, India; Harish Viswanathan, Bell Labs, USA; and Yang Richard Yang, Yale University, USA

Page 10: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxvii

Integrated Traffic Prediction and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh Networks .................................................................................502 Liang Dai, Vanderbilt University, U.S.A.; Yuan Xue, Vanderbilt University, U.S.A.; Bin Chang, Vanderbilt University, U.S.A.; Yanchuan Cao, Vanderbilt University, U.S.A.; and Yi Cui, Vanderbilt University, U.S.A. A Measurement Study of Heterogeneous Backhaul Connectivity in Dense Urban Mesh Networks ....................................................................................................511 Joseph Camp, Rice University, United States; Vincenzo Mancuso, Universita' di Palermo, Italy; Omer Gurewitz, Ben Gurion University of the Negev, Israel; and Edward W. Knightly, Rice University, United States Optimization Based Rate Control for Communication Networks with Inter-session Network Coding ...................................................................................................520 Abdallah Khreishah, Purdue University, USA; Chih-Chun Wang, Purdue University, USA; and Ness B. Shroff, The Ohio State University, USA Impact of File Arrivals and Departures on Buffer Sizing in Core Routers ..........................529 Ashvin Lakshmikantha, Broadcom Corporation, USA; R. Srikant, University of Illinois Urbana Champaign, USA; and Carolyn Beck, University of Illinois Urbana Champaign, USA Window Flow Control: Macroscopic Properties from Microscopic Factors ........................538 Ao Tang, Cornell University, USA; Lachlan L. H. Andrew, California Institute of Technology, USA; Krister Jacobsson, KTH, Sweden; Karl H. Johansson, KTH, Sweden; Steven H. Low, California Institute of Technology, USA; and Håken Hjalmarsson, KTH, Sweden On the Design of Load Factor based Congestion Control Protocols for Next Generation Networks ........................................................................................................547 Ihsan Ayyub Qazi, University of Pittsburgh, USA; and Taieb Znati, University of Pittsburgh, USA Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking .................................................................................................556 Sailesh Kumar, Washington University, USA; Jonathan Turner, Washington University, USA; and Patrick Crowley, Washington University, USA The Power of One Move: Hashing Schemes for Hardware ....................................................565 Adam Kirsch, Harvard University, USA; and Michael Mitzenmacher, Harvard University, USA All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs .........574 Alex X. Liu, Michigan State University, USA; Chad R. Meiners, Michigan State University, U.S.A.; and Yun Zhou, Michigan State University, U.S.A. Satisfying Arbitrary Delay Requirements in Multihop Networks .........................................583 Matthew Andrews, Bell Labs, USA; and Lisa Zhang, Bell Labs, USA MPLOT: A Transport Protocol Exploiting Multipath Diversity using Erasure Codes.......592 V. Sharma, Rensselaer Polytechnic Institute, USA; S. Kalyanaraman, Rensselaer Polytechnic Institute, USA; K. Kar, Rensselaer Polytechnic Institute, USA; K. K. Ramakrishnan, AT&T Research, USA; and V. Subramanian, Rensselaer Polytechnic Institute, USA

Page 11: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxviii

Balanced Relay Allocation on Heterogeneous Unstructured Overlays .................................601 Hung X. Nguyen, EPFL, Switzerland; Daniel R. Figueiredo, UFRJ, Brazil; Matthias Grossglauser, Nokia Research Center, Finland; and Patrick Thiran, EPFL, Switzerland Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics .............................610 Francois Baccelli, INRIA-ENS, France; Giovanna Carofiglio, Politecnico di Torino (Italy) / INRIA ENS (France), France; and Serguei Foss, Heriot-Watt University, United Kingdom Beltway Buffers: Avoiding the OS Traffic Jam .......................................................................619 Willem de Bruijn, Vrije Universiteit Amsterdam, The Netherlands; and Herbert Bos, Vrije Universiteit Amsterdam, The Netherlands Swarming on Optimized Graphs for n-way Broadcast...........................................................628 Georgios Smaragdakis, Boston University, USA; Nikolaos Laoutaris, Harvard University, USA; Pietro Michiardi, Eurocom, France; Azer Bestavros, Boston University, USA; John W. Byers, Boston University, USA; and Mema Roussopoulos, Harveard University, USA Link Lifetimes and Randomized Neighbor Selection in DHTs ..............................................637 Zhongmei Yao, Texas A&M University, US; and Dmitri Loguinov, Texas A&M University, US Optimal Peer-to-Peer Technique for Massive Content Distribution .....................................646 Xiaoying Zheng, University of Florida, USA; Chunglae Cho, University of Florida, USA; and Ye Xia, University of Florida, USA Algorithms for Low-Latency Remote File Synchronization...................................................655 Hao Yan, Polytechnic University, US; Utku Irmak, Yahoo! Inc., US; and Torsten Suel, Polytechnic University, US Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis .........................................................................................................664 Patrick Tague, University of Washington, United States; David Slater, University of Washington, United States; Jason Rogers, Naval Research Lab, United States; and Radha Poovendran, University of Washington, United States A Memory Efficient Multiple Pattern Matching Architecture for Network Security .........673 Tian Song, Tsinghua University, P.R.China; Wei Zhang, Tsinghua University, P.R.China; Dongsheng Wang, Tsinghua University, P.R.China; and Yibo Xue, Tsinghua University, P.R.China Live Baiting for Service-level DoS Attackers...........................................................................682 Sherif Khattab, University of Pittsburgh, USA; Sameh Gobriel, University of Pittsburgh, USA; Rami Melhem, University of Pittsburgh, USA; and Daniel Mossé, University of Pittsburgh, USA Firewall Compressor ..................................................................................................................691 Alex X. Liu, Michigan State University, U.S.A.; Eric Torng, Michigan State University, U.S.A.; and Chad R. Meiners, Michigan State University, U.S.A.

Page 12: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxix

SRLG Failure Localization in All-Optical Networks Using Monitoring Cycles and Paths ....................................................................................................700 Satyajeet S. Ahuja, University of Arizona, USA; Srinivasan Ramasubramanian, University of Arizona, USA; and Marwan Krunz, University of Arizona, USA On Survivable Access Network Design: Complexity and Algorithms ...................................709 Dahai Xu, AT&T Labs - Research, USA; Elliot Anshelevich, Rensselaer Polytechnic Institute, USA; and Mung Chiang, Princeton University, USA Survivable Multipath Provisioning with Differential Delay Constraint in Telecom Mesh Networks ............................................................................................................718 Sheng Huang, University of California, Davis, USA; Biswanath Mukherjee, University of California, Davis, USA; and Charles Martel, University of California, Davis, USA Improving Efficiency of Backup Reprovisioning in WDM Networks ...................................726 Massimo Tornatore, Politecnico di Milano, Italy; Diego Lucerna, Politecnico di Milano, Italy; and Achille Pattavina, Politecnico di Milano, Italy Spectrum Sharing Between Wireless Networks ......................................................................735 Leonard Grokop, U.C. Berkeley, USA; and David N. C. Tse, U.C. Berkeley, USA Capacity Scaling of Sparse Mobile Ad Hoc Networks ............................................................744 Michele Garetto, Università di Torino, Italy; Paolo Giaccone, Politecnico di Torino, Italy; and Emilio Leonardi, Politecnico di Torino, Italy A Unifying Perspective on The Capacity of Wireless Ad Hoc Networks ..............................753 Zheng Wang, University of California, Santa Cruz, USA; Hamid R. Sadjadpour, University of California, Santa Cruz, USA; and J. J. Garcia-Luna-Aceves, University of California, Santa Cruz and Palo Alto Research Center (PARC), USA Game-Theoretic Model for Collaborative Protocols in Selfish, Tariff-Free, Multihop Wireless Networks .....................................................................................................762 See-Kee Ng, National University of Singapore, Singapore; and Winston K. G. Seah, Institute for Infocomm Research, Singapore The Meandering Current Mobility Model and its impact on Underwater Mobile Sensor Networks ......................................................................................771 Antonio Caruso, University of Salento, Italy; Francesco Paparella, University of Salento, Italy; Luiz F. M. Vieira, UCLA, USA; Melike Erol, Istanbul Technical University, Turkey; and Mario Gerla, UCLA, USA Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks.................................................................................................780 Mehmet C. Vuran, University of Nebraska-Lincoln, USA; and Ian F. Akyildiz, Georgia Institute of Technology, USA T-Lohi: A New Class of MAC Protocols for Underwater Acoustic .......................................789 Affan A. Syed, USC, USA; Wei Ye, USC, USA; and John Heidemann, USC, USA

Page 13: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxx

USP: Underwater Sensor Positioning in Sparse 3D Acoustic Networks ...............................798 Wei Cheng, The George Washington University, U.S.A; Amin Y. Teymorian, The George Washington University, U.S.A; Liran Ma, The George Washington University, U.S.A; Xiuzhen Cheng, The George Washington University, U.S.A; Xicheng Lu, National University of Defense Technology, P.R.China; and Zexin Lu, National University of Defense Technology, P.R.China Throughput Anonymity Trade-off in Wireless Ad Hoc Networks ........................................807 Parvathinathan Venkitasubramaniam, Cornell University, USA; and Lang Tong, Cornell University, USA An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks .......................................................................................................816 Chenxi Zhang, University of Waterloo, Canada; Rongxing Lu, University of Waterloo, Canada; Xiaodong Lin, University of Waterloo, Canada; Pin-Han Ho, University of Waterloo, Canada; and Xuemin Shen, University of Waterloo, Canada Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks.....................825 Chi Zhang, Univ. of Florida, USA; Yang Song, Univ. of Florida, usa; and Yuguang Fang, Univ. of Florida, usa Access Control in Location-Based Broadcast Services ...........................................................834 Mudhakar Srivatsa, IBM T.J. Watson Research Center, USA; Arun Iyengar, IBM T.J. Watson Research Center, USA; Jian Yin, IBM T.J. Watson Research Center, USA; and Ling Liu, College of Computing, Georgia Institute of Technology, USA Tracking Down Skype Traffic ...................................................................................................843 Dario Bonfiglio, Politecnico di Torino, Italy; Marco Mellia, Politecnico di Torino, Italy; Michela Meo, Politecnico di Torino, Italy; Niccolò Ritacca, Politecnico di Torino, Italy; and Dario Rossi, ENST ParisTech, France Automatic Profiling of Network Event Sequences: Algorithm and Applications ................852 Xiaoqiao Meng, NEC Laboratories America, USA; Guofei Jiang, NEC Laboratories America, USA; Hui Zhang, NEC Laboratories America, USA; Haifeng Chen, NEC Laboratories America, USA; and Kenji Yoshihira, NEC Laboratories America, USA Characterizing and Modelling Clustering Features in AS-Level Internet Topology...........861 Yan Li, University of Connecticut, USA; Jun-Hong Cui, University of Connecticut, USA; Dario Maggiorini, University of Milano, Italy; and Michalis Faloutsos, University of California Riverside, USA Temporal Delay Tomography ...................................................................................................870 Vijay Arya, National ICT Australia (NICTA), Victorian Research Lab, The University of Melbourne, Australia; N. G. Duffield, AT&T Labs-Research, USA; and Darryl Veitch, ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), The University of Melbourne, Australia Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements ...............................................................879 Satyajayant Misra, Arizona State University, USA; Seung D. Hong, Arizona State University, USA; Guoliang Xue, Arizona State University, USA; and Jian Tang, Montana State University, USA

Page 14: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxi

On Maintaining Sensor-Actor Connectivity in Wireless Sensor and Actor Networks ........888 Jie Wu, Florida Atlantic University, USA; Shuhui Yang, Rensselaer Polytechnic Institute, USA; and Mihaela Cardei, Florida Atlantic University, USA Simple and Efficient k-Coverage Verification without Location Information .....................897 Yigal Bejerano, Bell-Labs, Alcatel-Lucent, U.S.A. Deploying Four-Connectivity And Full-Coverage Wireless Sensor Networks .....................906 Xiaole Bai, The Ohio State University, USA; Ziqiu Yun, Suzhou University, P. R. CHINA; Dong Xuan, The Ohio State University, USA; Ten H. Lai, The Ohio State University, USA; and Weijia Jia, City University of Hong Kong, P. R. CHINA Fair Scheduling Through Packet Election ...............................................................................915 Srikanth Jagabathula, MIT LIDS, USA; Vishal Doshi, MIT LIDS, USA; and Devavrat Shah, MIT LIDS, USA Quasi-output-buffered Switches................................................................................................924 Cheng-Shang Chang, National Tsing Hua University, Taiwan, R.O.C.; Jay Cheng, National Tsing Hua University, Taiwan, R.O.C.; Duan-Shin Lee, National Tsing Hua University, Taiwan, R.O.C.; and Chi-Feung Wu, National Tsing Hua University, Taiwan, R.O.C. MultiLayer Compressed Counting Bloom Filters ...................................................................933 Domenico Ficara, University of Pisa, Italy; Stefano Giordano, University of Pisa, Italy; Gregorio Procissi, University of Pisa, Italy; and Fabio Vitucci, University of Pisa, Italy Low Power TCAMs For Very Large Forwarding Tables ......................................................942 Wencheng Lu, Univ. of Florida, USA; and Sartaj Sahni, Univ. of Florida, USA How Bad Is Suboptimal Rate Allocation? ................................................................................951 Tian Lan, Princeton University, U.S.A.; Xiaojun Lin, Purdue University, U.S.A.; Mung Chiang, Princeton University, U.S.A.; and Ruby Lee, Princeton University, U.S.A. On the Performance of Primal/Dual Algorithms for Congestion Control in Networks with Dynamic Flows..................................................................................................960 Kexin Ma, Qualcomm Incorporated CDMA Technologies, USA; Ravi Mazumdar, University of Waterloo, Canada; and Jun Luo, University of Waterloo, Canada Utility Max-Min Fair Congestion Control with Time-Varying Delays .................................968 Konstantin Miller, Berlin Institute of Technology, Germany; and Tobias Harks, Berlin Institute of Technology, Germany Reducing Maximum Stretch in Compact Routing ..................................................................977 Mihaela Enachescu, Stanford University, USA; Mei Wang, Stanford University, USA; and Ashish Goel, Stanford University, USA A p-norm Flow Optimization Problem in Dense Wireless Sensor Networks........................986 Mehdi Kalantari, University of Maryland, USA; Masoumeh Haghpanahi, University of Maryland, USA; and Mark Shayman, University of Maryland, USA

Page 15: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxii

Select and Protest based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks ................................................................995 Hanna Kalosha, University of Ottawa, Canada; Amiya Nayak, University of Ottawa, Canada; Stefan Rührup, University of Ottawa, Canada; and Ivan Stojmenovic, University of Birmingham, UK Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional Links...........................................................1004 Chia-Hung Lin, National Tsing Hua University, Taiwan; Bing-Hong Liu, National Tsing Hua University, Taiwan; Hong-Yen Yang, National Tsing Hua University, Taiwan; Chi-Yen Kao, National Tsing Hua University, Taiwan; and Ming-Jer Tsai, National Tsing Hua University, Taiwan On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm .................................1013 Yan Wu, Purdue, USA; Sonia Fahmy, Purdue, USA; and Ness B. Shroff, Ohio State, USA Energy Efficient Opportunistic Network Coding for Wireless Networks...........................1022 Tao Cui, California Institute of Technology, USA; Lijun Chen, California Institute of Technology , USA; and Tracey Ho, California Institute of Technology , USA Channelization for Network Coding in Wireless Networks .................................................1031 Raju Kumar, Pennsylvania State University, USA; Heesook Choi, Sprint ATL, USA; Jaesheung Shin, ETRI, Korea (South); and Thomas La Porta, Pennsylvania State University, USA How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding........................................................................................................................1040 Jilin Le, Chinese University of Hong Kong, Hong Kong; John C.S. Lui, Chinese University of Hong Kong, Hong Kong; and Dah Ming Chiu, Chinese University of Hong Kong, Hong Kong Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks......................................................................................1049 Alireza Keshavarz-Haddad, Rice University, USA; and Rudolf Riedi, Rice University, USA Weighted Proportional Fairness Capacity of Gaussian MIMO Broadcast Channels........1058 Jia Liu, Virginia Polytechnic Institute and State University, U.S.A.; and Y. Thomas Hou, Virginia Polytechnic Institute and State University, U.S.A. Decentralized Rate Regulation in Random Access Channels...............................................1067 Ishai Menache, Technion - Israel Institute of Technology, Israel; and Nahum Shimkin, Technion - Israel Institute of Technology, Israel Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information .....................................................................................................................1076 Ishai Menache, Technion - Israel Institute of Technology, Israel; and Nahum Shimkin, Technion - Israel Institute of Technology, Israel

Page 16: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxiii

CTU: Capturing Throughput Dependencies in UWB Networks .........................................1085 Ioannis Broustis, University of California, Riverside, USA; Angelos Vlavianos, University of California, Riverside, USA; Prashant Krishnamurthy, University of Pittsburgh, USA; and Srikanth V. Krishnamurthy, University of California, Riverside, USA Online Energy Efficient Packet Scheduling with Delay Constraints in Wireless Networks ....................................................................................................................1094 Xiliang Zhong, Wayne State University, United States; and Cheng-Zhong Xu, Wayne State University, United States Unified Energy-Efficient Routing for Multi-hop Wireless Networks ..................................1103 Sungoh Kwon, Samsung Electronics Co., Korea; and Ness B. Shroff, The Ohio State University, USA An Energy Efficiency Evaluation for Sensor Nodes with Multiple Processors, Radios and Sensors...................................................................................................................1112 Deokwoo Jung, Yale University, USA; and Andreas Savvides, Yale University, USA Multi-Objective Topology Control in Wireless Networks ....................................................1121 Ron Banner, Technion, Israel; and Ariel Orda, Technion, Israel Power Awareness in Network Design and Routing ...............................................................1130 Joseph Chabarek, University of Wisconsin-Madison, USA; Joel Sommers, University of Wisconsin-Madison, USA; Paul Barford, University of Wisconsin-Madison, USA; Cristian Estan, University of Wisconsin-Madison, USA; David Tsiang, Cisco Systems, USA; and Stephen Wright, University of Wisconsin-Madison, USA Link-State Routing with Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering ..................................................................................................................1139 Dahai Xu, AT&T Labs - Research, United States; Mung Chiang, Princeton University, USA; and Jennifer Rexford, Princeton University, USA Area Avoidance Routing in Distance-Vector Networks........................................................1148 Haim Zlatokrilov, Tel Aviv University, Israel; and H. Levy Cluster-based Back-pressure Routing Algorithm .................................................................1157 Lei Ying, University of Illinois at Urbana-Champaign, U.S.; R. Srikant, University of Illinois at Urbana-Champaign, U.S.; and Don Towsley, University of Massachusetts Amherst, U.S. Cross-Layer Rate Control in Wireless Networks with Lossy Links: Leaky-Pipe Flow, Effective Network Utility Maximization and Hop-by-Hop Algorithms ..............................1166 Qinghai Gao, Arizona State University, USA; Junshan Zhang, Arizona State University, USA; and Stephen V. Hanly, The University of Melbourne, Australia Architecture and Abstractions for Environment and Traffic Aware System-Level Coordination of Wireless Networks: The Downlink Case ............................1175 Balaji Rengarajan, University of Texas at Austin, USA; and Gustavo de Veciana, University of Texas at Austin, USA

Page 17: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxiv

Computational Analysis and Efficient Algorithms for Micro and Macro OFDMA Scheduling .................................................................................................................1184 Reuven Cohen, Technion-Israel Institute of Technology, Israel; and Liran Katzir, Technion-Israel Institute of Technology, Israel On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes ............1193 Ulas C. Kozat, DoCoMo USA Labs, USA Adaptive Selective Verification ...............................................................................................1202 Sanjeev Khanna, University of Pennsylvania, USA; Santosh S. Venkatesh, University of Pennsylvania, USA; Omid Fatemieh, University of Illinois Urbana-Champaign, USA; Fariba Khan, University of Illinois Urbana-Champaign, USA; and Carl A. Gunter, University of Illinois Urbana-Champaign, USA A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing ........................................................................................................1211 Xukai Zou, Indiana University Purdue University Indianapolis, USA; Yuan-Shun Dai, University of Tennessee, Knoxville , USA; and Elisa Bertino, Purdue University, USA Exploring Historical Location Data for Anonymity Preservation in Location-based Services ...........................................................................................................1220 Toby Xu, Iowa State University, USA; and Ying Cai, Iowa State University, USA ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System ....................1229 Zhenyu Zhong, Secure Computing Corporation, USA; Lakshmish Ramaswamy, The University of Georgia, USA; and Kang Li, The University of Georgia, USA BodyQoS: Adaptive and Radio-Agnostic QoS for Body Sensor Networks .........................1238 Gang Zhou, College of William and Mary, United States; Jian Lu, University of Virginia, United States; Chieh-Yih Wan, Intel Corporation, United States; Mark D. Yarvis, Intel Corporation, United States; and John A. Stankovic, University of Virginia, United States CORD: Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks..............1247 Leijun Huang, George Mason University, United States; and Sanjeev Setia, George Mason University, United States APL: Autonomous Passive Localization for Wireless Sensors deployed in Road Networks .........................................................................................................................1256 Jaehoon Jeong, University of Minnesota, USA; Shuo Guo, University of Minnesota, USA; Tian He, University of Minnesota, USA; and David Du, University of Minnesota, USA Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection ....................................................................................................1265 Yanmin Zhu, HK University of Science and Technology, China; and Lionel M. Ni, HK University of Science and Technology, China Border Effects, Fairness, and Phase Transition in Large Wireless Networks ....................1274 Mathilde Durvy, EPFL, switzerland; Olivier Dousse, Deutsche Telekom Laboratories, Germany; and Patrick Thiran, EPFL, switzerland

Page 18: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxv

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks ....................................................................................................................1283 Simone Merlin, University of Padova, Italy; Nitin Vaidya, University of Illinois at Urbana-Champaign, USA; and Michele Zorzi, University of Padova, Italy Joint Scheduling and Congestion Control in Mobile Ad-Hoc Networks.............................1292 Umut Akyol, Rutgers University, USA; Matthew Andrews, Bell Labs, USA; Piyush Gupta, Bell Labs, USA; John Hobby, Bell Labs, USA; Iraj Saniee, Bell Labs, USA; and Alexander Stolyar, Bell Labs, USA On the Capacity of Multi-Channel Wireless Networks Using Directional Antennas.........1301 Hong-Ning Dai, The Chinese University of Hong Kong, Hong Kong; Kam-Wing Ng, The Chinese University of Hong Kong, Hong Kong; Raymond Chi-Wing Wong, The Chinese University of Hong Kong, Hong Kong; and Min-You Wu, Shanghai Jiao Tong University, P. R. China Queueing Analysis of Loss Systems with Variable Optical Delay Lines .............................1310 Duan-Shin Lee, National Tsing Hua University, Taiwan; Cheng-Shang Chang, National Tsing Hua University, Taiwan; Jay Cheng, National Tsing Hua University, Taiwan; and Horng-Sheng Yan, National Tsing Hua University, Taiwan Emergency Handling in Ethernet Passive Optical Networks using Priority-based Dynamic Bandwidth Allocation.....................................................................1319 Byongkwon Moon, ETRI, Korea All-Optical Label Stacking: Easing the Trade-offs Between Routing and Architecture Cost in All-Optical Packet Switching...............................................................1328 Fernando Solano, Informatics and Applications, Spain; Ruth Van Caenegem, IBBT, Belgium; Didier Colle, IBBT, Belgium; José L. Marzo, Informatics and Applications, Spain; Mario Pickavet, IBBT, Belgium; Ramón Fabregat, Informatics and Applications, Spain; and Piet Demeester, IBBT, Belgium On Constructions of Optical Queues with a Limited Number of Recirculations ...............1337 Jay Cheng, National Tsing Hua University, Taiwan, R.O.C.; Cheng-Shang Chang, National Tsing Hua University, Taiwan, R.O.C.; Tsz-Hsuan Chao, National Tsing Hua University, Taiwan, R.O.C.; Duan-Shin Lee, National Tsing Hua University, Taiwan, R.O.C.; and Ching-Min Lien, National Tsing Hua University, Taiwan, R.O.C. Closed Form Solutions for Symmetric Water Filling Games ...............................................1346 Eitan Altman, INRIA Sophia Antipolis, France; Konstantin Avrachenkov, INRIA Sophia Antipolis, France; and Andrey Garnaev, St. Petersburg State University, Russia Spot Pricing of Secondary Spectrum Usage in Wireless Cellular Networks.......................1355 Huseyin Mutlu, Boston University, USA; Murat Alanyali, Boston University, USA; and David Starobinski, Boston University, USA Self-organizing Dynamic Fractional Frequency Reuse in OFDMA Systems......................1364 Alexander L. Stolyar, Bell Labs, Alcatel-Lucent, USA; and Harish Viswanathan, Bell Labs, Alcatel-Lucent, USA

Page 19: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxvi

Cell Selection in 4G Cellular Networks ..................................................................................1373 David Amzallag, BT, Israel / UK; Reuven Bar-Yehuda, Technion, Israel; Danny Raz, Technion, Israel; and Gabriel Scalosub, Tel Aviv University, Israel A Novel Access Method for Supporting Absolute and Proportional Priorities in 802.11 WLANs ..............................................................................1382 Mohammad Nassiri, Grenoble Informatics Laboratory, France; Martin Heusse, Grenoble Informatics Laboratory, France; and Andrzej Duda, Grenoble Informatics laboratory, France Drive-by Localization of Roadside WiFi Networks...............................................................1391 Anand Prabhu Subramanian, Stony Brook University, USA; Pralhad Deshpande, Stony Brook University, USA; Jie Gao, Stony Brook University, USA; and Samir R. Das, Stony Brook University, USA Call Admission Control in IEEE 802.11 WLANs using QP-CAT........................................1400 Sangho Shin, Columbia University, USA; and Henning Schulzrinne, Columbia University, USA Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal ..............................................................................................................................1409 Shravan Rayanchu, University of Wisconsin Madison, USA; Arunesh Mishra, University of Wisconsin Madison, USA; Dheeraj Agrawal, University of Wisconsin Madison, USA; Sharad Saha, University of Wisconsin Madison, USA; and Suman Banerjee, University of Wisconsin Madison, USA Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Networks..........................................................................................................1418 Gentian Jakllari, UC Riverside, USA; Stephan Eidenbenz, Los Alamos National Lab, USA; Nicolas Hengartner, Los Alamos National Lab, USA; Srikanth V, Krishnamurthy, UC Riverside, USA; and Michalis Faloutsos, UC Riverside, USA Network Formation Among Selfish Energy-Constrained Wireless Devices .......................1427 Hithesh Nama, WINLAB, Rutgers University, USA; Narayan Mandayam, WINLAB, Rutgers University, USA; and Roy Yates, WINLAB, Rutgers University, USA Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks..........................................................................................................1436 Ehsan Aryafar, Rice University, USA; Omer Gurewitz, Ben Gurion University, Israel; and Edward W. Knightly, Rice University, USA Minimum Cost Topology Construction for Rural Wireless Mesh Networks .....................1445 Debmalya Panigrahi, MIT, USA; Partha Dutta, IBM India Research Lab, India; Sharad Jaiswal, Bell Labs Research India, Alcatel-Lucent , India; K. V. M. Naidu, Bell Labs Research India, Alcatel-Lucent , India; and Rajeev Rastogi, Bell Labs Research India, Alcatel-Lucent , India Minimum Cost Data Aggregation with Localized Processing for Statistical Inference ..................................................................................................................1454 Animashree Anandkumar, Cornell University, USA; Lang Tong, Cornell University, USA; Ananthram Swami, Army Research Laboratory, USA; and Anthony Ephremides, University of Maryland College Park, USA

Page 20: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxvii

Connectivity-based Localization of Large Scale Sensor Networks with Complex Shape .........................................................................................................................1463 Sol Lederer, Stony Brook University, USA; Yue Wang, Stony Brook University, USA; and Jie Gao, Stony Brook University, USA Robust Planarization of Unlocalized Wireless Sensor Networks .........................................1472 Fenghui Zhang, Texas A&M University, USA; Anxiao Jiang, Texas A&M University, USA; and Jianer Chen, Texas A&M University, USA On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast ................................................................................1481 Joohwan Kim, Purdue University, U.S.A.; Xiaojun Lin, Purdue University, U.S.A.; Ness B. Shroff, The Ohio State University, U.S.A.; and Prasun Sinha, The Ohio State University, U.S.A. Capacity of Opportunistic Routing in Multirate and Multihop Wireless Networks..........1490 Kai Zeng, Worcester Polytechnic Institute, USA; Wenjing Lou, Worcester Polytechnic Institute, USA; and Hongqiang Zhai, Philips Research North America, USA An Information Model for Geographic Greedy Forwarding in Wireless Ad Hoc Sensor Networks .........................................................................................1499 Zhen Jiang, West Chester University, USA; Junchao Ma, Hong Kong Polytechnic University, China; Wei Lou, Hong Kong Polytechnic University, China; and Jie Wu, Florida Atlantic University & US NSF, USA Randomized 3D Geographic Routing .....................................................................................1508 Roland Flury, ETH Zurich, Switzerland; and Roger Wattenhofer, ETH Zurich, Switzerland Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet Reception ..........................................................................1517 Xin Wang, University of California, Santa Cruz, USA; and J. J. Garcia-Luna-Aceves, Palo Alto Research Center, USA Optimal Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access Networks .............................................................1526 Eun-Chan Park, Telecommunication & Network Division, Samsung Electronics Co., LTD., Korea; Hwangnam Kim, School of Electrical Engineering, Korea University, Korea; Jae-Young Kim, Telecommunication & Network Division, Samsung Electronics Co., LTD., Korea; and Han-Seok Kim, Telecommunication & Network Division, Samsung Electronics Co., LTD., Korea Creating Templates to Achieve Low Delay in Multi-Carrier Frame-Based Wireless Data Systems .............................................................................................................1535 Matthew Andrews, Bell Labs, USA; and Lisa Zhang, Bell Labs, USA Stable and Efficient Spectrum Access in Next Generation Dynamic Spectrum Networks..................................................................................................1543 Lili Cao, University of California, Santa Barbara, U.S.A; and Haitao Zheng, University of California, Santa Barbara, U.S.A

Page 21: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxviii

End-to-End Resource Allocation in OFDM Based Linear Multi-Hop Networks ...............1552 Xiaolu Zhang, National University of Singapore, Singapore; Wenhua Jiao, Bell Lab Research China, China; and Meixia Tao, Shanghai Jiao Tong University, China Analysis of Price Competition in a Slotted Resource Allocation Game ..............................1561 Patrick Maillé, TELECOM Bretagne, France; and Bruno Tuffin, INRIA Rennes, France Design and Analysis of Hybrid Packet Schedulers................................................................1570 Douglas Comer, Cisco Systems, Purdue University, USA; and Maxim Martynov, Cisco Systems, USA Improved Smoothed Round Robin Schedulers for High-Speed Packet Networks.............1579 Chuanxiong Guo, Microsoft Research Asia, China Modeling Resource Sharing Dynamics of VoIP users over a WLAN using a Game-Theoretic Approach ......................................................................................................1588 Edson H. Watanabe, Federal University of Rio de Janeiro, Brazil; Daniel S. Menasché, Federal University of Rio de Janeiro, Brazil; Edmundo de Souza e Silva, Federal University of Rio de Janeiro, Brazil; and Rosa M. M. Leão, Federal University of Rio de Janeiro, Brazil On the Levy-walk Nature of Human Mobility.......................................................................1597 Injong Rhee, NC State University, US; Minsu Shin, NC State University, US; Seongik Hong, NC State University, US; Kyunghan Lee, KAIST, Korea; and Song Chong, KAIST, Korea Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless Networks ....................................................................................................................1606 Wenye Wang, North Carolina State University, USA; and Ming Zhao, North Carolina State University, USA HERO: Online Real-time Vehicle Tracking in Shanghai .....................................................1615 Hongzi Zhu, Shanghai Jiao Tong University, China; Yanmin Zhu, Hong Kong University of Science and Technology, China; Minglu Li, Shanghai Jiao Tong University, China; and Lionel M. Ni, Hong Kong University of Science and Technology, China Wide-Area IP Network Mobility.............................................................................................1624 Xin Hu, The University of Michigan, United States; Li Li, Bell Labs, Alcatel-Lucent, United States; Z. Morley Mao, The University of Michigan, United States; and Yang Richard Yang, Yale University, United States Iso-Contour Queries and Gradient Routing with Guaranteed Delivery in Sensor Networks .......................................................................................................................1633 Rik Sarkar, Stony Brook University, USA; Xianjin Zhu, Stony Brook University, USA; Jie Gao, Stony Brook University, USA; Leonidas J. Guibas, Stanford University, USA; and Joseph S. B. Mitchell, Stony Brook University, USA

Page 22: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xxxix

iBubble: Multi-keyword Routing Protocol for Heterogeneous Wireless Sensor Networks .......................................................................................................................1642 Xiaoming Lu, UC Davis, USA; Matt Spear, UC Davis, USA; Karl Levitt, UC Davis, USA; and S. Felix Wu, UC Davis, USA Distributed Operator Placement and Data Caching in Large-Scale Sensor Networks .......................................................................................................................1651 Lei Ying, UIUC, U.S.; Zhen Liu, IBM, U.S.; Don Towsley, UMASS-Amherst, U.S.; and Cathy H. Xia, IBM , U.S. Which Distributed Averaging Algorithm Should I Choose for my Sensor Network? .......1660 Patrick Denantes, EPFL, Switzerland; Florence Bénézit, EPFL, Switzerland; Patrick Thiran, EPFL, Switzerland; and Martin Vetterli, EPFL, Switzerland Feasible Rate Allocation in Wireless Networks .....................................................................1669 Ramakrishna Gummadi, University of Illinois at Urbana Champaign, USA; Kyomin Jung, Massachusetts Institute of Technology, USA; Devavrat Shah, Massachusetts Institute of Technology, USA; and Ramavarapu Sreenivas, University of Illinois at Urbana Champaign, USA Proportional Fairness in Multi-rate Wireless LANs .............................................................1678 Li Li, Bell Labs, Alcatel-Lucent, USA; Martin Pal, google, USA; and Yang Richard Yang, Yale, USA Topology Control for Maximizing Network Capacity Under the Physical Model .............1687 Yan Gao, University of Illinois at Urbana Champaign, USA; Jennifer C. Hou, University of Illinois at Urbana Champaign, USA; and Hoang Nguyen, University of Illinois at Urbana Champaign, USA Starvation Modeling and Identification in Dense 802.11 Wireless Community Networks...............................................................................................1696 Cunqing Hua, University of Houston, USA; and Rong Zheng, University of Houston, USA Inside the New Coolstreaming: Principles, Measurements and Performance Implications........................................................................................................1705 Bo Li, Hong Kong University of Science and Technology, Hong Kong; Susu Xie, Hong Kong University of Science and Technology, Hong Kong; Yang Qu, Tsinghua University, China; Gabriel Y. Keung, Hong Kong University of Science and Technology, Hong Kong; Chuang Lin, Tsinghua University, China; Jiangchuan Liu, Simon Fraser University, Canada; and Xinyan Zhang, Roxbeam Inc, China Achieving Honest Ratings with Reputation-based Fines in Electronic Markets ................1714 Thanasis G. Papaioannou, Athens University of Economics and Business, Greece; and George D. Stamoulis, Athens University of Economics and Business, Greece Understanding Disconnection and Stabilization of Chord ...................................................1723 Zhongmei Yao, Texas A&M University, US; and Dmitri Loguinov, Texas A&M University, US On Reducing Mesh Delay for Peer-to-Peer Live Streaming.................................................1732 Dongni Ren, HKUST, Hong Kong; Y.-T. Hillman Li, HKUST, Hong Kong; and S.-H. Gary Chan, HKUST, Hong Kong

Page 23: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xl

Incremental Bloom Filters .......................................................................................................1741 Fang Hao, Bell Laboratories, Alcatel-Lucent, USA; Murali Kodialam, Bell Laboratories, Alcatel-Lucent, USA; and T. V. Lakshman, Bell Laboratories, Alcatel-Lucent, USA Resolving Anonymous Routers in Internet Topology Measurement Studies .....................1750 Mehmet H. Gunes, The University of Texas at Dallas, United states; and Kamil Sarac, The University of Texas at Dallas, United states The Inframetric Model for the Internet .................................................................................1759 Pierre Fraigniaud, CNRS, France; Emmanuelle Lebhar, CNRS, France; and Laurent Viennot, INRIA, France Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators................................................................................................................1768 Xiaoming Wang, Texas A&M University, USA; Xiliang Liu, The City University of New York, USA; and Dmitri Loguinov, Texas A&M University, USA Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks...........................................................................1777 Changhee Joo, The Ohio State University, USA; Xiaojun Lin, Purdue University, USA; and Ness B. Shroff, The Ohio State University, USA Adaptive Frame Cancatenation Mechanisms for QoS in Multi-rate Wireless Ad Hoc Networks ......................................................................................................1786 Ming Li, California State University, Fresno, USA; Hua Zhu, San Diego Research Center, USA; Yang Xiao, University of Alabama, USA; Imrich Chlamtac, Create-Net, Italy; and Balakrishnan Prabhakaran, The University of Texas at Dallas, USA Fast and Distributed Computation of Schedules in Wireless Networks..............................1795 Supratim Deb, Bell Labs Research India, India; Karan Mangla, Stanford University, USA; and K. V. M. Naidu, Bell Labs Research India, India Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone Networks.....................................................................................................1804 Anand Srinivas, Massachusetts Institute of Technology, USA; and Eytan Modiano, Massachusetts Institute of Technology, USA Multihop Local Pooling for Distributed Throughput Maximization in Wireless Networks ....................................................................................................................1813 Gil Zussman, Columbia University, USA; Andrew Brzezinski , Fidelity Investments, USA; and Eytan Modiano, MIT, USA Capacity of Asynchronous Random-Access Scheduling in Wireless Networks..................1822 Deepti Chafekar, Virginia Tech., USA; Dave Levin, University of Maryland, College Park, USA; V. S. Anil Kumar, Virginia Tech., USA; Madhav V. Marathe, Virginia Tech., USA; Srinivasan Parthasarathy, IBM T. J. Watson Research Center, USA; and Aravind Srinivasan, University of Maryland, College Park, USA Distributed Robust Optimization for Communication Networks........................................1831 Kai Yang, Columbia University, USA; Yihong Wu, Princeton University, USA; Jianwei Huang, Chinese University of Hong Kong, China; Xiaodong Wang, Columbia University, USA; and Sergio Verdú, Princeton University, USA

Page 24: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xli

Approximation Algorithms for Computing Capacity of Wireless Networks with SINR constraints .............................................................................1840 Deepti Chafekar, Virginia Tech, USA; V.S. Anil Kumar, Virginia Tech, USA; Madhav V. Marathe, Virginia Tech, USA; Srinivasan Parthasarathy, IBM T.J. Watson Research Center, USA; and Aravind Srinivasan, University of Maryland, USA Light-weight Contour Tracking in Wireless Sensor Networks ............................................1849 Xianjin Zhu, Stony Brook University, USA; Rik Sarkar, Stony Brook University, USA; Jie Gao, Stony Brook University, USA; and Joseph S. B. Mitchell, Stony Brook University, USA Essentia: Architecting Wireless Sensor Networks Asymmetrically.....................................1858 Tian He, University of Minnesota, USA; John A. Stankovic, University of Virginia, USA; Radu Stoleru, Texas A&M University, USA; Yu Gu, University of Minnesota, USA; and Yafeng Wu, University of Virginia, USA Realistic and Efficient Multi-Channel Communications in Dense Sensor Networks.........1867 Yafeng Wu, University of Virginia, United States; John Stankovic, University of Virginia, United States; Tian He, University of Minnesota, United States; and Shan Lin, University of Virginia, United States Using Transmit-only Sensors to Reduce Deployment Cost of Wireless Sensor Networks .......................................................................................................1876 Bartlomiej Blaszczyszyn, INRIA/ENS, France; and Bozidar Radunovic, Microsoft Research, UK Dynamic Jamming Mitigation for Wireless Broadcast Networks .......................................1885 Jerry T. Chiang, University of Illinois - Urbana Champaign, USA; and Yih-Chun Hu, University of Illinois- Urbana Champaign, USA A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks ...................................................................................................1894 Liran Ma, The George Washington University, U.S.A; Amin Y. Teymorian, The George Washington University, U.S.A; and Xiuzhen Cheng, The George Washington University, U.S.A ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.........................................................................................1903 Rongxing Lu, University of Waterloo, Canada; Xiaodong Lin, University of Waterloo, Canada; Haojin Zhu, University of Waterloo, Canada; Pin-Han Ho, University of Waterloo, Canada; and Xuemin Shen, University of Waterloo, Canada On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks ............................1912 Maxim Raya, EPFL, Switzerland; Panagiotis Papadimitratos, EPFL, Switzerland; Virgil D. Gligor, Carnegie Mellon University, USA; and Jean-Pierre Hubaux, EPFL, Switzerland Adding Capacity Points to a Wireless Mesh Network Using Local Search ........................1921 Joshua Robinson, Rice University, USA; Mustafa Uysal, HP Labs, USA; Ram Swaminathan, HP Labs, USA; and Edward Knightly, Rice University, USA

Page 25: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xlii

Association Control in Mobile Wireless Networks ................................................................1930 Minkyong Kim, IBM, USA; Zhen Liu, IBM, USA; Srinivasan Parthasarathy, IBM, USA; Dimitrios Pendarakis, IBM, USA; and Hao Yang, IBM, USA On the Performance of IEEE 802.11 under Jamming ..........................................................1939 Emrah Bayraktaroglu, Northeastern University, USA; Christopher King, Northeastern University, USA; Xin Liu, Northeastern University, USA; Guevara Noubir, Northeastern University, USA; Rajmohan Rajaraman, Northeastern University, USA; and Bishal Thapa, Northeastern University, USA Measurement Based Analysis and Modeling of the Error Process in IEEE 802.15.4 LR-WPANs ......................................................................................................1948 Muhammad U. Ilyas, Michigan State University, United States; and Hayder Radha, Michigan State University, United States Mobile Data Gathering with Space-Division Multiple Access in Wireless Sensor Networks .......................................................................................................1957 Miao Zhao, Stony Brook University, USA; Ming Ma, Stony Brook University, USA; and Yuanyuan Yang, Stony Brook University, USA A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks ............1966 Yi Shi, Virginia Tech, USA; and Y. Thomas Hou, Virginia Tech, USA Opportunistic Scheduling in Cognitive Radio Networks ......................................................1975 Rahul Urgaonkar, University of Southern California, USA; and Michael J. Neely, University of Southern California, USA Cooperative Opportunistic Routing using Transmit Diversity in Wireless Mesh Networks..........................................................................................................1984 Mathias Kurth, Humboldt University Berlin, Germany; Anatolij Zubow, Humboldt University Berlin, Germany; and Jens-Peter Redlich, Humboldt University Berlin, Germany Towards Optimal Operator Placement in Partial-Fault Tolerant Applications ................1993 Nikhil Bansal, IBM T. J. Watson Research Center, USA; Ranjita Bhagwan, Microsoft Research, India; Navendu Jain, University of Texas, Austin, USA; Yoonho Park, IBM T. J. Watson Research Center, USA; Deepak Turaga, IBM T. J. Watson Research Center, USA; and Chitra Venkatramani, IBM T. J. Watson Research Center, USA Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and Traffic ......................................................................................................................2002 Sundar Subramanian, The University of Texas at Austin, USA; Sanjay Shakkottai, The University of Texas at Austin, USA; and Piyush Gupta, Alcatel-Lucent, USA Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation ...............................................................................................2011 Di Wang, Rensselaer Polytechnic Institute, USA; and Alhussein A. Abouzeid, Rensselaer Polytechnic Institute, USA Circular Sailing Routing for Wireless Networks...................................................................2020 Fan Li, University of North Carolina at Charlotte, USA; and Yu Wang, University of North Carolina at Charlotte, USA

Page 26: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xliii

Multi-channel Live P2P Streaming: Refocusing on Servers ................................................2029 Chuan Wu, University of Toronto, Canada; Baochun Li, University of Toronto, Canada; and Shuqiao Zhao, UUSee Inc., China Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming...............................................................................................................2038 Feng Wang, Simon Fraser University, Canada; Jiangchuan Liu, Simon Fraser University, Canada; and Yongqiang Xiong, Microsoft Research Asia, China FLoD: A Framework for Peer-to-Peer 3D Streaming ..........................................................2047 Shun-Yun Hu, National Central University, Taiwan; Ting-Hao Huang, National Taiwan University, Taiwan; Shao-Chen Chang, National Central University, Taiwan; Wei-Lun Sung, National Central University, Taiwan; Jehn-Ruey Jiang, National Central University, Taiwan; and Bing-Yu Chen, National Taiwan University, Taiwan Snoogle: A Search Engine for the Physical World ................................................................2056 Haodong Wang, College of William and Mary, USA; Chiu C. Tan, College of William and Mary, USA; and Qun Li, College of William and Mary, USA Towards a Theory of Robust Localization against Malicious Beacon Nodes .....................2065 Sheng Zhong, State University of New York at Buffalo, USA; Murtuza Jadliwala, State University of New York at Buffalo, USA; Shambhu Upadhyaya, State University of New York at Buffalo, USA; and Chunming Qiao, State University of New York at Buffalo, USA Optimal Sleep-Wake Scheduling for Quickest Intrusion Detection using Wireless Sensor Networks .......................................................................................................2074 K. Premkumar, Indian Institute of Science, India; and Anurag Kumar, Indian Institute of Science, India An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks............................................................................................2083 Zhen Yu, Iowa State University, USA; Yawen Wei, Iowa State University, USA; Bhuvaneswari Ramkumar, Iowa State University, USA; and Yong Guan, Iowa State University, USA Lightweight and Compromise-Resilient Message Authentication in Sensor Networks .......................................................................................................................2092 Wensheng Zhang, Iowa State University, USA; Nalin Subramanian, Iowa State University, USA; and Guiling Wang, New Jersey Institute of Technology, USA Opportunistic Spectrum Access in Cognitive Radio Networks ............................................2101 Senhua Huang, University of California, Davis, USA; Xin Liu, University of California, Davis, USA; and Zhi Ding, University of California, Davis, USA MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes .....................................................................................................2110 Guner D. Celik, Massachusetts Institute of Technology, USA; Gil Zussman, Columbia University, USA; Wajahat F. Khan, Massachusetts Institute of Technology, USA; and Eytan Modiano, Massachusetts Institute of Technology, USA

Page 27: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xliv

How Physical Carrier Sense Affects System Throughput in IEEE 802.11 Wireless Networks ....................................................................................................................2119 Zheng Zeng, UIUC, USA; Yong Yang, UIUC, USA; and Jennifer C. Hou, UIUC, USA Channel Aware Distributed Scheduling For Exploiting Multiuser Diversity and Multi-Receiver Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach .....2128 Dong Zheng, Arizona State University, USA; Min Cao, University of Illinois at Urbana-Champaign, USA; Junshan Zhang, Arizona State University, USA; and P. R. Kumar, University of Illinois at Urbana-Champaign, USA Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-hop Networks .................................................................................................................2137 Yufang Xi, Yale University, USA; and Edmund M. Yeh, Yale University, USA Guaranteeing Quality of Service to Peering Traffic..............................................................2146 Rui Zhang-Shen, Princeton University, United States; and Nick McKeown, Stanford University, United States A Stateless and Light-Weight Bandwidth Management Mechanism for Elastic Traffic...2153 Ravi S. Prasad, Georgia Tech, USA; Marina Thottan, Bell-Labs, USA; and T. V. Lakshman, Bell-Labs, USA Stability and Delay Bounds in Heterogeneous Networks of Aggregate Schedulers ...........2162 Gianluca Rizzo, epfl, Switzerland; and Jean-Yves Le Boudec, epfl, Switzerland Efficient Broadcast in MANETs Using Network Coding and Directional Antennas.........2171 Shuhui Yang, Rensselaer Polytechnic Institute, USA; Jie Wu, Florida Atlantic University, USA; and Mihaela Cardei, Florida Atlantic University, USA Efficient Network Coded Data Transmissions in Disruption Tolerant Networks..............2180 Yunfeng Lin, University of Toronto, Canada; Baochun Li, University of Toronto, Canada; and Ben Liang, University of Toronto, Canada AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks .......................................................................................................2189 I-Hong Hou, University of Illinois, Urbana-Champaign, USA; Yu-En Tsai, University of Illinois, Urbana-Champaign, USA; Tarek F. Abdelzaher, University of Illinois, Urbana-Champaign, USA; and Indranil Gupta, University of Illinois, Urbana-Champaign, USA Continuous Network Coding in Wireless Relay Networks ...................................................2198 Wei Pu, University of Science and Technology of China, China; Chong Luo, Microsoft research asia, China; Shipeng Li, Microsoft research asia, China; and Chang Wen Chen, State Univ. of New York at Buffalo, USA Competitive Analysis of Opportunistic Spectrum Access Strategies...................................2207 Nicholas B. Chang, MIT Lincoln Laboratory, USA; and Mingyan Liu, University of Michigan, USA Globally Optimal Channel Assignment for Non-cooperative Wireless Networks..............2216 Fan Wu, SUNY at Buffalo, USA; Sheng Zhong, SUNY at Buffalo, USA; and Chunming Qiao, SUNY at Buffalo, USA

Page 28: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xlv

On Wireless Social Community Networks .............................................................................2225 Mohammad Hossein Manshaei, EPFL, Switzerland; Julien Freudiger, EPFL, Switzerland; Mark Félegyházi, EPFL, Switzerland; Peter Marbach, University of Toronto, Canada; and Jean-Pierre Hubaux, EPFL, Switzerland Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks ....................................................................................................................2234 Greger Wikstrand, Umeå University, Sweden; Thomas Nilsson, Umeå University, Sweden; and Mark S. Dougherty, Högskolan Dalarna, Sweden Index Policies for Real-time Multicast Scheduling for Wireless Broadcast Systems .........2243 Vivek Raghunathan, University of Illinois, Urbana-Champaign, USA; Vivek Borkar, Tata Institute of Fundamental Research, India; Min Cao, University of Illinois, Urbana-Champaign, USA; and P. R. Kumar, University of Illinois, Urbana-Champaign, USA Real-Time Video Multicast in WiMAX Networks.................................................................2252 Supratim Deb, Bell Labs Research India, India; Sharad Jaiswal, Bell Labs Research India, India; and Kanthi Nagaraj, Bell Labs Research India, India Cross-Monotonic Multicast .....................................................................................................2261 Zongpeng Li, University of Calgary, Canada Multicast Tree Diameter for Dynamic Distributed Interactive Applications .....................2270 Knut-Helge Vik, Simula Research Labs and University Of Oslo, Norway; Pål Halvorsen, Simula Research Labs and University Of Oslo, Norway; and Carsten Griwodz, Simula Research Labs and University Of Oslo, Norway Capacity of Hybrid Cellular-Ad hoc Data Networks ............................................................2279 Lap Kong Law, University of California, Riverside, USA; Srikanth V. Krishnamurthy, University of California, Riverside, USA; and Michalis Faloutsos, University of California, Riverside, USA Design Guidelines for Routing Metrics in Multihop Wireless Networks ............................2288 Yaling Yang, Virginia Tech, USA; and Jun Wang, Microsoft Corporation, USA Building Robust Nomadic Wireless Mesh Networks using Directional Antennas .............2297 Qunfeng Dong, University of Science and Technology of China, China; and Yigal Bejerano, Bell-Labs, Alcatel-Lucent, U.S.A. Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks ......................................................................................................2306 Jingpu Shi, Rice University, US; Omer Gurewitz, Ben Gurion University of the Negev, Israel; Vincenzo Mancuso, Universita' di Palermo, Italy; Joseph Camp, Rice University, US; and Edward W. Knightly, Rice University, US A High-Fidelity Device-Independent Router Model .............................................................2315 Roman Chertov, Purdue, USA; Sonia Fahmy, Purdue, USA; and Ness B. Shroff, Ohio State, USA

Page 29: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xlvi

GRE Encapsulated Multicast Probing - A Scalable Technique for Measuring One-Way Loss .......................................................................................................2324 Yu Gu, University of Massachusetts, Amherst, USA; Lee Breslau, AT&T Labs– Research, USA; Nick Duffield, AT&T Labs–Research, USA; and Subhabrata Sen, AT&T Labs–Research, USA Complex Network Measurements: Estimating the Relevance of Observed Properties .....2333 Matthieu Latapy, Université Pierre et Marie Curie (UPMC - Paris 6) and CNRS, France; and Clémence Magnien, Université Pierre et Marie Curie (UPMC - Paris 6) and CNRS, France Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch ... ......................................................................................................2342 Jens B. Schmitt, University of Kaiserslautern, Germany; Frank A. Zdarsky, University of Kaiserslautern, Germany; and Markus Fidler, Darmstadt University of Technology, Germany Sampling Strategies for Epidemic-Style Information Dissemination ..................................2351 Milan Vojnovic, Microsoft Research, United Kingdom; Varun Gupta, Carnegie Mellon University, United States; Thomas Karagiannis, Microsoft Research, United Kingdom; and Christos Gkantsidis, Microsoft Research, United Kingdom A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks..........................................................................................................2360 Jinyuan Sun, University of Florida, USA; Chi Zhang, University of Florida, USA; and Yuguang Fang, University of Florida, USA Exact Modeling of Propagation for Permutation-Scanning Worms ...................................2369 Parbati Kumar Manna, University of Florida, USA; Shigang Chen, University of Florida, USA; and Sanjay Ranka, University of Florida, USA Distributed Spatial Anomaly Detection..................................................................................2378 Parminder Chhabra, Boston University, USA; Clayton Scott, University of Michigan, Ann Arbor, USA; Eric D. Kolaczyk, Boston University, USA; and Mark Crovella, Boston University, USA HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space ...........................................................................................................2387 Stefano Castelli, University of Trento, Italy; Paolo Costa, Vrije Universiteit, The Netherlands; and Gian Pietro Picco, University of Trento, Italy Searching for Rare Objects using Index Replication ............................................................2396 Krishna P. N. Puttaswamy, University of California, Santa Barbara, USA; Alessandra Sala, University of Salerno, Italy; and Ben Y. Zhao, University of California, Santa Barbara, USA Bandwidth-Aware Routing in Overlay Networks .................................................................2405 Sung-Ju Lee, Hewlett-Packard Labs, USA; Sujata Banerjee, Hewlett-Packard Labs, USA; Puneet Sharma, Hewlett-Packard Labs, USA; Praveen Yalagandula, Hewlett-Packard Labs, USA; and Sujoy Basu, Hewlett-Packard Labs, USA

Page 30: 27th IEEE Conference on Computer Communicationstoc.proceedings.com/03392webtoc.pdf · 27th IEEE Conference on Computer Communications (INFOCOM) Phoenix, Arizona 15-17 April 2008 IEEE

xlvii

Minerva: Learning to Infer Network Path Properties..........................................................2414 Rita H. Wouhaybi, Columbia Unversity & Intel Corporation, USA; Puneet Sharma, HP Labs, USA; Sujata Banerjee, HP Labs, USA; and Andrew T. Campbell, Dartmouth College, USA Design of Robust Random Access Protocols For Wireless Networks using Game Theoretic Models ...........................................................................................................2423 Younggeun Cho, Stanford University, USA; Chan-Soo Hwang, Samsung AIT, South Korea; and Fouad A. Tobagi, Stanford University, USA A Stochastic Evolutionary Game Approach to Energy Management in a Distributed Aloha Network .....................................................................................................2432 Eitan Altman, INRIA, FRANCE; and Yezekael Hayel, LIA/University of Avignon, FRANCE Detecting 802.11 MAC Spoofing Using Received Signal Strength.......................................2441 Yong Sheng, Google, US; Keren Tan, Dartmouth College, US; Guanling Chen, University of Massachusetts Lowell, US; David Kotz, Dartmouth College, US; and Andrew Campbell, Dartmouth College, US Wireless Medium Access via Adaptive Backoff: Delay and Loss Minimization.................2450 Gardar Hauksson, Boston University, USA; and Murat Alanyali, Boston University, USA Beyond TCAMs: An SRAM-based Parallel Multi-Pipeline Architecture for Terabit IP Lookup....................................................................................................................2458 Weirong Jiang, University of Southern California, USA; Qingbo Wang, University of Southern California, USA; and Viktor K. Prasanna, University of Southern California, USA A Memory-Efficient Hashing by Multi-Predicate Bloom Filters for Packet Classification ................................................................................................................2467 Heeyeol Yu, Texas A&M University, Texas US; and Rabi Mahapatra, Texas A&M University, Texas US Time Blocking in Time-Driven-Switched Networks..............................................................2476 Viet-Thang Nguyen, Universita` di Trento, Italy; Renato Lo Cigno, Universita` di Trento, Italy; Yoram Ofek, Universita` di Trento, Italy; and Miklos Telek, Budapest University of Technology and Economics, Hungary Run-time System for Scalable Network Services...................................................................2485 Upendra Shevade, The University of Texas at Austin, USA; Ravi Kokku, NEC Labs, Princeton, USA; and Harrick M. Vin, The University of Texas at Austin, USA