| 2010 | A new VPN routing approach for large scale networks. Zied Ben-Houidi, Mickael Meulle |
| 2010 | An opportunistic relay protocol for vehicular road-side access with fading channels. Joon Yoo, Brian Sung Chul Choi, Mario Gerla |
| 2010 | Assigning AS relationships to satisfy the Gao-Rexford conditions. Luca Cittadini, Giuseppe Di Battista, Thomas Erlebach, Maurizio Patrignani, Massimo Rimondini |
| 2010 | Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization. Yating Hsu, David Lee |
| 2010 | Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance. Jun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou |
| 2010 | CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. Zhenyu Yang, Ming Li, Wenjing Lou |
| 2010 | DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks. Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, Mario Gerla |
| 2010 | ETOC: Obtaining robustness in component-based localization. Xiaoping Wang, Yunhao Liu, Zheng Yang, Junliang Liu, Jun Luo |
| 2010 | Exploring the hidden connectivity in urban vehicular networks. Kebin Liu, Mo Li, Yunhao Liu, Xiang-Yang Li, Minglu Li, Huadong Ma |
| 2010 | Fast routing table lookup based on deterministic multi-hashing. Zhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam |
| 2010 | Firewall modules and modular firewalls. Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda |
| 2010 | Granting silence to avoid wireless collisions. Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, Philip Alexander Levis |
| 2010 | GreenTE: Power-aware traffic engineering. Mingui Zhang, Cheng Yi, Bin Liu, Beichuan Zhang |
| 2010 | Identification-free batch authentication for RFID tags. Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu |
| 2010 | Identifying suspicious activities through DNS failure graph analysis. Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang |
| 2010 | Impairment-aware path selection and regenerator placement in translucent optical networks. Fernando A. Kuipers, Anteneh Beshir, Ariel Orda, Piet Van Mieghem |
| 2010 | Message from the General Co-Chairs. Teruo Higashino, Kenji Suzuki |
| 2010 | Message from the technical program committee chairs. Sonia Fahmy, Toru Hasegawa |
| 2010 | Neighbor-specific BGP: An algebraic exploration. Alexander J. T. Gurney, Timothy G. Griffin |
| 2010 | Network Coding aware Rate Selection in multi-rate IEEE 802.11. Raju Kumar, Srikar Tati, Felipe de Mello, Srikanth V. Krishnamurthy, Thomas La Porta |
| 2010 | On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks. Wei Gao, Guohong Cao |
| 2010 | Optimal cache-based route repair for real-time traffic. Chuan Han, Yaling Yang, Yongxiang Peng |
| 2010 | Optimal distributed P2P streaming under node degree bounds. Shaoquan Zhang, Ziyu Shao, Minghua Chen |
| 2010 | Passive interference measurement in Wireless Sensor Networks. Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Jun Huang, Mo Sha, Liusheng Huang |
| 2010 | Peer-assisted VoD prefetching in double auction markets. Yuan Feng, Baochun Li, Bo Li |
| 2010 | Practical Virtual Coordinates for large wireless sensor networks. Jiangwei Zhou, Yu Chen, Ben Leong, Boqin Feng |
| 2010 | Proceedings of the 18th annual IEEE International Conference on Network Protocols, ICNP 2010, Kyoto, Japan, 5-8 October, 2010 |
| 2010 | RELICS: In-network realization of incentives to combat selfishness in DTNs. Md. Yusuf Sarwar Uddin, Brighten Godfrey, Tarek F. Abdelzaher |
| 2010 | Routing in max-min fair networks: A game theoretic approach. Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang |
| 2010 | Scalable video multicast with joint layer resource allocation in broadband wireless networks. Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan |
| 2010 | SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution. Matthew J. Probst, Jun Cheol Park, Ravin Abraham, Sneha Kumar Kasera |
| 2010 | TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation. Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck |
| 2010 | TowerDefense: Deployment strategies for battling against IP prefix hijacking. Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu |
| 2010 | UVOC-MAC: A MAC protocol for outdoor ultraviolet networks. Yiyang Li, Jianxia Ning, Zhengyuan Xu, Srikanth V. Krishnamurthy, Gang Chen |