28. INFOCOM 2009:
Rio de Janeiro,
Brazil
 INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil.
 IEEE 2009  
  
  
  
  
 
Congestion Control 1
 
Routing 1
 
- Rafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock:
 Multirate Anypath Routing in Wireless Mesh Networks.
37-45
             
- Hongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang:
 Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks.
46-54
             
- Simon Heimlicher, Merkourios Karaliopoulos, Hanoch Levy, Thrasyvoulos Spyropoulos:
 On Leveraging Partial Paths in Partially-Connected Networks.
55-63
             
- Yujun Li, Yaling Yang, Xianliang Lu:
 Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing.
64-72
             
P2P 1
 
- Di Wu, Yong Liu, Keith W. Ross:
 Queuing Network Models for Multi-Channel P2P Live Streaming Systems.
73-81
             
- Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao:
 Distilling Superior Peers in Large-Scale P2P Streaming Systems.
82-90
             
- Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. Ramakrishnan, Rittwik Jana, Divesh Srivastava:
 CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast.
91-99
             
- Eugenio Alessandria, Massimo Gallo, Emilio Leonardi, Marco Mellia, Michela Meo:
 P2P-TV Systems under Adverse Network Conditions: A Measurement Study.
100-108
             
Sensor Networks 1
 
- Ming-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Liu, Wei Shu:
 Surface Coverage in Wireless Sensor Networks.
109-117
             
- Ji Luo, Dan Wang, Qian Zhang:
 Double Mobility: Coverage of the Sea Surface with Mobile Sensor Networks.
118-126
             
- Anwar Saipulla, Cédric Westphal, Benyuan Liu, Jie Wang:
 Barrier Coverage of Line-Based Deployed Wireless Sensor Networks.
127-135
             
- Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun Sinha:
 Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks.
136-144
             
Energy Efficiency
 
Network Coding 1
 
Vehicular,
Delay Tolerant Networks
 
Congestion Control 2
 
- Ruogu Li, Lei Ying, Atilla Eryilmaz, Ness B. Shroff:
 A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows.
253-261
             
- Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha, Injong Rhee:
 DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks.
262-270
             
- Krishna Prasanna Jagannathan, Eytan Modiano, Lizhong Zheng:
 On the Trade-Off Between Control Rate and Congestion in Single Server Systems.
271-279
             
- Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard, Michael Mitzenmacher, João Barros:
 Network Coding Meets TCP.
280-288
             
Routing 2
 
P2P 2
 
- Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu:
 Analysis of Adaptive Incentive Protocols for P2P Networks.
325-333
             
- Xinyu Zhang, Baochun Li:
 On the Market Power of Network Coding in P2P Content Distribution Systems.
334-342
             
- Raul Landa, David Griffin, Richard G. Clegg, Eleni Mykoniati, Miguel Rio:
 A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks.
343-351
             
- Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki:
 Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks.
352-360
             
Sensor Networks 2
 
- Xiaoyu Chu, Harish Sethu:
 A New Distributed Algorithm for Even Coverage and Improved Lifetime in a Sensor Network.
361-369
             
- Maleq Khan, V. S. Anil Kumar, Madhav V. Marathe, Gopal Pandurangan, S. S. Ravi:
 Bi-Criteria Approximation Algorithms for Power-Efficient and Low-Interference Topology Control in Unreliable Ad Hoc Networks.
370-378
             
- Matthew P. Johnson, Deniz Sarioz, Amotz Bar-Noy, Theodore Brown, Dinesh Verma, Chai Wah Wu:
 More is More: The Benefits of Denser Sensor Deployment.
379-387
             
- Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia:
 Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks.
388-396
             
Security 1
 
Network Coding 2
 
Wireless / QoS
 
Inference 1
 
- MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Peir:
 Fit a Spread Estimator in Small Memory.
504-512
             
- Fang Hao, Murali S. Kodialam, T. V. Lakshman, Haoyu Song:
 Fast Multiset Membership Testing Using Combinatorial Bloom Filters.
513-521
             
- Yi Lu, Balaji Prabhakar:
 Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture.
522-530
             
- Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wang:
 Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints.
531-539
             
Routing 3
 
P2P 3
 
Sensor Networks 3
 
Security 2
 
- Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Jun Li:
 Packet Classification Algorithms: From Theory to Practice.
648-656
             
- Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy:
 Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks.
657-665
             
- Jie Yang, Yingying Chen, Wade Trappe, Jay Cheng:
 Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
666-674
             
- Song Liu, Yingying Chen, Wade Trappe, Larry J. Greenstein:
 ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks.
675-683
             
Measurements,
Management
 
Optical 1
 
- Duan-Shin Lee, Kai-Jie Hsu, Cheng-Shang Chang, Jay Cheng:
 Emulation and Approximation of a Flexible Delay Line by Parallel Non-Overtaking Delay Lines.
720-728
             
- Josef Kanizo, David Hay, Isaac Keslassy:
 The Crosspoint-Queued Switch.
729-737
             
- Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee:
 SDL Constructions of FIFO, LIFO and Absolute Contractors.
738-746
             
- Cheng-Shang Chang, Yu-Hao Hsu, Jay Cheng, Duan-Shin Lee:
 A Dynamic Frame Sizing Algorithm for CICQ Switches with 100% Throughput.
747-755
             
Architecture,
Survivability 
 
Inference 2
 
DTN 1
 
P2P 4
 
Sensor Networks 4
 
Security 3
 
- Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Qiao:
 ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query.
936-944
             
- Jing Shi, Rui Zhang, Yanchao Zhang:
 Secure Range Queries in Tiered Sensor Networks.
945-953
             
- Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang:
 Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
954-962
             
- Shucheng Yu, Kui Ren, Wenjing Lou:
 FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
963-971
             
Incentive Pricing and Game Theory
 
Optical 2
 
Resource Management
 
Inference 3
 
DTN 2
 
- Pierre-Ugo Tournoux, Jeremie Leguay, Farid Benbadis, Vania Conan, Marcelo Dias de Amorim, John Whitbeck:
 The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN Routing.
1116-1124
             
- Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar Kalyanaraman:
 An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks.
1125-1133
             
- Eitan Altman, Giovanni Neglia, Francesco De Pellegrini, Daniele Miorandi:
 Decentralized Stochastic Control of Delay Tolerant Networks.
1134-1142
             
- Abdul Jabbar, Justin P. Rohrer, Andrew Oberthaler, Egemen K. Cetinkaya, Victor Frost, James P. G. Sterbenz:
 Performance Comparison of Weather Disruption-Tolerant Cross-Layer Routing Algorithms.
1143-1151
             
P2P 5
 
Sensor Networks 5 
 
- Liang Liu, Xi Zhang, Huadong Ma:
 Dynamic Node Collaboration for Mobile Target Tracking in Wireless Camera Sensor Networks.
1188-1196
             
- Dengpan Zhou, Jie Gao:
 Opportunistic Processing and Query of Motion Trajectories in Wireless Sensor Networks.
1197-1205
             
- Yong Yang, I-Hong Hou, Jennifer C. Hou, Mallikarjun Shankar, Nageswara S. V. Rao:
 Sensor Placement for Detecting Propagative Sources in Populated Environments.
1206-1214
             
- Ziguo Zhong, Ting Zhu, Dan Wang, Tian He:
 Tracking with Unreliable Node Sequences.
1215-1223
             
Security 4
 
Wireless Scheduling 1
 
TCAM / Optical
 
Capacity
 
Inference 4
 
- Shrinivasa Kini, Srinivasan Ramasubramanian, Amund Kvalbein, Audun Fosselie Hansen:
 Fast Recovery from Dual Link Failures in IP Networks.
1368-1376
             
- Paul Barford, Nick Duffield, Amos Ron, Joel Sommers:
 Network Performance Anomaly Detection and Localization.
1377-1385
             
- Hung Xuan Nguyen, Renata Teixeira, Patrick Thiran, Christophe Diot:
 Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis.
1386-1394
             
- Darryl Veitch, Brice Augustin, Renata Teixeira, Timur Friedman:
 Failure Control in Multipath Route Tracing.
1395-1403
             
DTN 3
 
P2P 6
 
Security 5
 
- Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci:
 A Social Network Based Patching Scheme for Worm Containment in Cellular Networks.
1476-1484
             
- Jasmina Omic, Ariel Orda, Piet Van Mieghem:
 Protecting Against Network Infections: A Game Theoretic Perspective.
1485-1493
             
- Marc Lelarge, Jean Bolot:
 Economic Incentives to Increase Security in the Internet: The Case for Insurance.
1494-1502
             
- Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
 Defending Mobile Phones from Proximity Malware.
1503-1511
             
Wireless Scheduling 2
 
- Wei Cheng, Xiuzhen Cheng, Taieb Znati, Xicheng Lu, Zexin Lu:
 The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks.
1512-1520
             
- Bo Han, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Anand Srinivasan:
 Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks.
1521-1529
             
- Liqun Fu, Soung Chang Liew, Jianwei Huang:
 Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design.
1530-1538
             
- Karthikeyan Sundaresan, Sampath Rangarajan:
 Efficient Algorithms for Leveraging Spatial Reuse in OFDMA Relay Networks.
1539-1547
             
Optical 3
 
LAN,
Access Networks
 
Game Theory,
Wireless
 
- Eitan Altman, Ishai Menache, Alberto Suarez:
 Team and Noncooperative Solutions to Access Control with Priorities.
1611-1619
             
- Amir Nahir, Ariel Orda, A. Freund:
 Topology Design and Control: A Game-Theoretic Perspective.
1620-1628
             
- Eitan Altman, Anurag Kumar, Chandramani Kishore Singh, Rajesh Sundaresan:
 Spatial SINR Games Combining Base Station Placement and Mobile Association.
1629-1637
             
- Xin Ai, Vikram Srinivasan, Chen-Khong Tham:
 Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network.
1638-1646
             
Ad Hoc 1
 
Wireless Scheduling 3
 
Sensor Networks 6
 
Security 6 
 
- Adam Bender, Rob Sherwood, Derek Monner, Nathan Goergen, Neil Spring, Bobby Bhattacharjee:
 Fighting Spam with the NeighborhoodWatch DHT.
1755-1763
             
- Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, M. Stephenson, J. Barker:
 Detecting Spam Zombies by Monitoring Outgoing Messages.
1764-1772
             
- Jun-Won Ho, Matthew Wright, Samir K. Das:
 Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.
1773-1781
             
- Lei Yu, Jianzhong Li:
 Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks.
1782-1790
             
Coding,
Wireless 
 
MAC 1
 
- Chih-Cheng Hsu, Kuang-Fu Lai, Cheng-Fu Chou, Kate Ching-Ju Lin:
 ST-MAC: Spatial-Temporal MAC Scheduling for Underwater Sensor Networks.
1827-1835
             
- Petar Djukic, Prasant Mohapatra:
 Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware.
1836-1844
             
- Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xiaorui Wang:
 C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks.
1845-1853
             
- HyungJune Lee, Hyukjoon Kwon, Arik Motskin, Leonidas J. Guibas:
 Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach.
1854-1862
             
Ad Hoc 2
 
- Cheng Wang, Xiang-Yang Li, Changjun Jiang, ShaoJie Tang, Yunhao Liu, Jizhong Zhao:
 Scaling Laws on Multicast Capacity of Large Scale Wireless Networks.
1863-1871
             
- Olga Goussevskaia, Roger Wattenhofer, Magnús M. Halldórsson, Emo Welzl:
 Capacity of Arbitrary Wireless Networks.
1872-1880
             
- Urs Niesen, Piyush Gupta, Devavrat Shah:
 The Multicast Capacity Region of Large Wireless Networks.
1881-1889
             
- Giuseppa Alfano, Michele Garetto, Emilio Leonardi:
 Capacity Scaling of Wireless Networks with Inhomogeneous Node Density: Lower Bounds.
1890-1898
             
Error Correction,
Wireless
 
Security 7
 
- Etienne Perron, Suhas N. Diggavi, Emre Telatar:
 On Cooperative Wireless Network Secrecy.
1935-1943
             
- Toby Xu, Ying Cai:
 Location Cloaking for Safety Protection of Ad Hoc Networks.
1944-1952
             
- Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu:
 ACTION: Breaking the Privacy Barrier for RFID Systems.
1953-1961
             
- Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, Jihyuk Choi:
 Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks.
1962-1970
             
Multicasting
 
Scheduling
 
MAC 2
 
- Seung-Jae Han, Thyaga Nandagopal, Yigal Bejerano, Hyoung-Gyu Choi:
 Analysis of Spatial Unfairness in Wireless LANs.
2043-2051
             
- Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edward W. Knightly:
 Synchronized CSMA Contention: Model, Implementation and Evaluation.
2052-2060
             
- Joseph Naor, Danny Raz, Gabriel Scalosub:
 Toward Optimal Utilization of Shared Random Access Channels.
2061-2069
             
- Yu Cheng, Xinhua Ling, Weihua Zhuang:
 A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols.
2070-2078
             
Ad Hoc 3
 
Cooperative Networks,
Wireless
 
Sensor Networks 7
 
- Animashree Anandkumar, Meng Wang, Lang Tong, Ananthram Swami:
 Prize-Collecting Data Fusion for Cost-Performance Tradeoff in Distributed Inference.
2150-2158
             
- Bo Yu, Jiangchuan Li, Yong Li:
 Distributed Data Aggregation Scheduling in Wireless Sensor Networks.
2159-2167
             
- Changlei Liu, Guohong Cao:
 Minimizing the Cost of Mine Selection Via Sensor Networks.
2168-2176
             
- Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
 Identity Aware Sensor Networks.
2177-2185
             
Security 8 
 
- Adel El-Atawy, Ehab Al-Shaer:
 Building Covert Channels over the Packet Reordering Phenomenon.
2186-2194
             
- Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
 Blind Detection of Spread Spectrum Flow Watermarks.
2195-2203
             
- Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness B. Shroff:
 TCP/IP Timing Channels: Theory to Implementation.
2204-2212
             
- Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
 An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding.
2213-2221
             
Multicasting,
Wireless
 
Backend Services
 
- Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
 Link Gradients: Predicting the Impact of Network Latency on Multitier Applications.
2258-2266
             
- Ho-Lin Chen, Jason R. Marden, Adam Wierman:
 On the Impact of Heterogeneity and Back-End Scheduling in Load Balancing Designs.
2267-2275
             
- Dan Li, Chuanxiong Guo, Haitao Wu, Kun Tan, Songwu Lu:
 FiConn: Using Backup Port for Server Interconnection in Data Centers.
2276-2285
             
- Hongbo Jiang, Arun Iyengar, Erich M. Nahum, Wolfgang Segmuller, Asser N. Tantawi, Charles P. Wright:
 Load Balancing for SIP Server Clusters.
2286-2294
             
MAC 3
 
- Senhua Huang, Xin Liu, Zhi Ding:
 Optimal Sensing-Transmission Structure for Dynamic Spectrum Access.
2295-2303
             
- Juncheng Jia, J. Jun Jun Zhang, Qian Zhang:
 Cooperative Relay for Cognitive Radio Networks.
2304-2312
             
- Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Choi, Robert Grant, Hyrum K. Wright, Ketan Mandke, Robert C. Daniels, Robert W. Heath Jr., Scott Nettles:
 An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems.
2313-2321
             
- Haythem Bany Salameh, Marwan Krunz, Ossama Younis:
 Dynamic Spectrum Access Protocol Without Power Mask Constraints.
2322-2330
             
Ad Hoc 4
 
Wireless,
Sensor Networks
 
Sensor Networks 8
 
- Zheng Yang, Yunhao Liu, Xiang-Yang Li:
 Beyond Trilateration: On the Localizability of Wireless Ad-Hoc Networks.
2392-2400
             
- Yue Wang, Sol Lederer, Jie Gao:
 Connectivity-Based Sensor Network Localization with Incremental Delaunay Refinement Method.
2401-2409
             
- Liang Zhang, Shigang Chen, Ying Jian, Yuguang Fang:
 Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks.
2410-2418
             
- Mo Li, Yunhao Liu, Jiliang Wang, Zheng Yang:
 Sensor Network Navigation without Locations.
2419-2427
             
Security 9
 
- Feng Li, Jie Wu, Anand Srinivasan:
 Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets.
2428-2436
             
- Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Boutaba:
 Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks.
2437-2445
             
- Fabio Soldo, Athina Markopoulou, Katerina J. Argyraki:
 Optimal Filtering of Source Address Prefixes: Models and Algorithms.
2446-2454
             
- Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao:
 A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses.
2455-2463
             
Protocols,
Wireless
 
Algorithms
 
- Josef Kanizo, David Hay, Isaac Keslassy:
 Optimal Fast Hashing.
2500-2508
             
- Mohammad Behdadfar, Hossein Saidi, Hamid Alaei, Babak Samari:
 Scalar Prefix Search: A New Route Lookup Algorithm for Next Generation Internet.
2509-2517
             
- Haoyu Song, Fang Hao, Murali S. Kodialam, T. V. Lakshman:
 IPv6 Lookups using Distributed and Load Balanced Bloom Filters for 100Gbps Core Router Line Cards.
2518-2526
             
- Etienne Perron, Dinkar Vasudevan, Milan Vojnovic:
 Using Three States for Binary Consensus on Complete Graphs.
2527-2535
             
Ad Hoc Mobile Networks 1
 
- Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:
 Capacity of Multi-Hop Wireless Networks with Incomplete Traffic Specification.
2536-2540
             
- Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen:
 AAA: Asynchronous, Adaptive, and Asymmetric Power Management for Mobile Ad Hoc Networks.
2541-2545
             
- Zhiqiang Li, F. Richard Yu, Minyi Huang:
 A Cooperative Spectrum Sensing Consensus Scheme in Cognitive Radios.
2546-2550
             
- Lifeng Sang, Anish Arora:
 Capabilities of Low-Power Wireless Jammers.
2551-2555
             
- Xiaoyuan Ta, Guoqiang Mao, Brian D. O. Anderson:
 On the Properties of Giant Component in Wireless Multi-Hop Networks.
2556-2560
             
QoS Provisionings and Evaluations
 
Content Distribution and Delay/Disruption Tolerance Networks
 
Broadband Access Technologies
 
- Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, Shugong Xu, Songwu Lu:
 Proportional Fair Frequency-Domain Packet Scheduling for 3GPP LTE Uplink.
2611-2615
             
- Jin Teng, Changqing Xu, Weijia Jia, Dong Xuan:
 D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks.
2616-2620
             
- Sriram Lakshmanan, Karthikeyan Sundaresan, Ravi Kokku, A. Khojestepour, Sampath Rangarajan:
 Towards Adaptive Beamforming in Indoor Wireless Networks: An Experimental Approach.
2621-2625
             
- Thomas Bonald, Ali Ibrahim, James Roberts:
 Enhanced Spatial Reuse in Multi-Cell WLANs.
2626-2630
             
Network Control and Management 1