direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

Publications by Type: Journal and Magazine Articles


Richa, Andréa and Scheideler, Christian and Schmid, Stefan and Zhang, Jin (2012). An Efficient and Fair MAC Protocol Robust to Reactive Interference. IEEE/ACM Transactions on Networking (ToN)

Marcin Bienkowski and Leszek Gasieniec and Marek Klonowski and Miroslaw Korzeniowski and Bernard Mans and Stefan Schmid and Roger Wattenhofer (2015). Distributed Alarming in the On-Duty and Off-Duty Models. IEEE/ACM Transactions on Networking (ToN)

Smaragdakis, Georgios and Laoutaris, Nikolaos and Bestavros, Azer and Byers, John W. (2012). Selfish Overlay Network Creation and Maintenance. IEEE/ACM Transactions on Networking (ToN)

Paschalidis, Ioannis Ch. and Smaragdakis, Georgios (2009). Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures. IEEE/ACM Transactions on Networking, 685–697.

Fay, Damien and Haddadi, Hamed and Thomason, Andrew G. and Moore, Andrew W. and Mortier, Richard and Jamakovic, Almerima and Uhlig, Steve and Rio, Miguel (2010). Weighted Spectral Distribution for Internet Topology Analysis: Theory and Applications. IEEE/ACM Transactions on Networking, 164–176.

Feldmann, Anja and Rexford, Jennifer and Caceres, Ramon (1998). Efficient policies for carrying Web traffic over flow-switched networks. IEEE/ACM Trans. Netw.. IEEE Press, 673–685.

Ferreira, Lucio Studer and Dias de Amorim, Marcelo and Iannone, Luigi and Berlemann, Lars and Correia, Luis M. (2010). Opportunistic Management of Spontaneous and Heterogeneous Wireless Mesh Networks. IEEE Wireless Communications Magazine, 41–46.

Flury, Manuel and Merz, Ruben and Le Boudec, Jean-Yves (2011). Synchronization for Impulse-Radio UWB with Energy-Detection and Multi-User Interference: Algorithms and Application to IEEE 802.15.4a. IEEE Transactions on Signal Processing, 5458–5472.

Smaragdakis, Georgios and Laotaris, Nikolaos and Michiardi, Pietro and Bestavros, Azer and Byers, John W. and Roussopoulos, Mema (2010). Distributed Network Formation for n-way Broadcast Applications. IEEE Transactions on Parallel and Distributed Systems, 1427–1441.

Laoutaris, Nikolaos and Smaragdakis ,Georgios and Bestavros, Azer and Matta, Ibrahim and Stavrakakis, Ioannis (2007). Distributed Selfish Caching. IEEE Transactions on Parallel and Distributed Systems. IEEE Press, 1361–1376.

Agarwal, Sachin and Chauhan, Vikas and Trachtenberg, Ari (2006). Bandwidth Efficient String Reconciliation Using Puzzles. IEEE Transactions on Parallel and Distributed Systems, 1217–1225.

Han, Bo and Hui, Pan and Kumar, V.S. Anil and Marathe, Madhav V. and Shao Jianhua and Srinivasan, Aravind (2011). Mobile Data Offloading through Opportunistic Communications and Social Participation. IEEE Transactions on Mobile Computing (TMC)

Hui, Pan and Crowcroft, Jon and Yoneki, Eiko (2011). BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks. IEEE Transactions on Mobile Computing (TMC). IEEE, 1576–1589.

Han, Bo and Hui, Pan and Kumar, V.S. Anil and Marathe, Madhav V. and Shao, Jianhua and Srinivasan, Aravind (2012). Mobile Data Offloading through Opportunistic Communications and Social Participation. IEEE Transactions on Mobile Computing (TMC)

Merz, Ruben and Le Boudec, Jean-Yves (2009). Performance Evaluation of Impulse Radio UWB Networks using Common or Private Acquisition Preambles. IEEE Transactions on Mobile Computing. IEEE Computer Society, 865–879.

Chaintreau, Augustin and Hul, Pan and Crowcroft, Jon and Diot, Christohpe and Gass, Richard and Scott, James (2007). Impact of Human Mobility on Opportunistic Forwarding Algorithms. IEEE Transactions on Mobile Computing, 606–620.

Franceschetti, Massimo and Dousse, Olivier and Tse, David N.C. and Thiran, Patrick (2007). Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transactions on Information Theory, 1009–1018.

Liebeherr, Jorg and Burchard, Almut and Ciucu, Florin (2012). Delay Bounds in Communication Networks with Heavy-Tailed and Self-Similar Traffic. IEEE Transactions on Information Theory

Gilbert, Anna C. and Willinger, Walter and Feldmann, Anja (1999). Scaling analysis of conservative cascades, with applications to network traffic. IEEE Transactions on Information Theory, 971–991.

Ciucu, Florin and Burchard, Almut and Liebeherr, Jorg (2006). Scaling Properties of Statistical End-to-End Bounds in Network Calculus. IEEE Transactions on Information Theory. IEEE Press, 2300–2312.

Xiao, Yu and Li, Wei and Siekkinen, Matti and Savolainen, Petri and Ylä-Jääski, Antti and Hui, Pan (2012). Power Management for Wireless Data Transmission Using Complex Event Processing. IEEE Transactions on Computers (TC)

Buchegger, Sonja and Mundinger, Jochen and Le Boudec, Jean-Yves (2008). Reputation Systems for Self-Organized Networks: Lessons Learned. IEEE Technology and Society Magazine, 41–47.

Avramopoulos, Ioannis and Suchara, Martin (2009). Protecting DNS from routing attacks: Two alternative anycast implementations. IEEE Security and Privacy, 14–20.

Feldmann, Anja and Rexford, Jennifer (2001). IP network configuration for intradomain traffic engineering. IEEE Network Magazine. IEEE Computer Society, 46–57.

Feldmann, Anja and Greenberg, Albert and Lund, Carsten and Reingold, Nick and Rexford, Jennifer (2000). NetScope: traffic engineering for IP networks. IEEE Network Magazine, 11–19.

Dainotti, A. and Benson, K. and King, A. and Huffaker, B. and Glatz, E. and Dimitropoulos, X. and Richter, P. and Finamore, A. and Snoeren, A. (2016). Lost in Space: Improving Inference of IPv4 Address Space Utilization. IEEE Journal on Selected Areas in Communications (JSAC)

Cittadini, Luca and Mühlbauer, Wolfgang and Uhlig, Steve and Bush, Randy and François, Pierre and Maennel, Olaf (2010). Evolution of Internet Address Space Deaggregation: Myths and Reality. IEEE Journal on Selected Areas in Communications, 1238–1249.

Wang, Yi and Avramopoulos, Ioannis and Rexford, Jennifer (2009). Design for configurability: Rethinking interdomain routing policies from the ground up. IEEE Journal on Selected Areas in Communications, 336–348.

Poese, Ingmar and Frank, Benjamin and Ager, Bernhard and Smaragdakis, Georgios and Uhlig, Steve and Feldmann, Anja (2012). Improving Content Delivery with PaDIS. IEEE Internet Computing

Marco Canini and Anja Feldmann and Dan Levin and Fabian Schaffert and Stefan Schmid (2014). Panopticon: Incremental Deployment of Software-Defined Networking. IEEE Computer

Chiesa, Marco and Dietzel, Christoph and Antichi, Gianni and Bruyere, Marc and Castro, Ignacio and Gusat, Mitch and King, Thomas and Moore, Andrew W and Nguyen, Thanh Dang and Owezarski, Philippe and others (2016). Inter-domain networking innovation on steroids: empowering ixps with SDN capabilities. IEEE Communications Magazine. IEEE, 102–108.

Caceres, Ramon and Duffield, Nick and Feldmann, Anja and Friedmann, John D. and Greenberg, Albert and Greer, Rick and Johnson, T. and Kalmanek, Chuck R. and Krishnamurthy, Balachander and Lavelle, D. and Mishra, Partho and Rexford, Jennifer and Ramakrishnan, K.K. and True, Fred D. and van der Merwe, Jacobus E. (2000). Measurement and analysis of IP network usage and behavior. IEEE Communications Magazine, 144–151.

El Fawal, Alaeddine and Le Boudec, Jean-Yves and Merz, Ruben and Radunovic, Bozidar and Widmer, Jörg and Maggio, Gian Mario (2005). Tradeoff Analysis of PHY-aware MAC in Low-Rate, Low-Power UWB networks. IEEE Communications Magazine, 147–155.

Nahle, Salim and Iannone, Luigi and Donnet, Benoit and Malouch, Naceur (2007). On the Construction of WiMAX Mesh Tree. IEEE Communication Letters, 967–969.

Li, Yong and Hui, Pan and Jin, Depeng and Su, Li and Zeng, Lieguang (2010). Evaluating the Impact of Social Selfishness on the Epidemic Routing in Delay Tolerant Networks. IEEE Communication Letters, 1026–1028.


Locher, Thomas and Schmid, Stefan and Wattenhofer, Roger (2011). eDonkey and eMule's Kad: Measurements and Attacks. Fundamenta Informaticae. IOS Press, 383–403.


Manilici, Vlad and Wundsam, Andreas and Feldmann, Anja and Vidales, Pablo (2009). Potential benefit of flow-based routing in multihomed environments. European Transactions on Telecommunications (ETT), 650–659.

Rostami, Ahmad and Wolisz, Adam and Feldmann, Anja (2009). Traffic analysis in optical burst switching networks: a trace-based case study. European Transactions on Telecommunications (ETT), 633–649.

Iannone, Luigi and Kabassanov, Konstantin and Fdida, Serge (2007). Evaluation of Cross-Layer Rate-Aware Routing in a Wireless Mesh Network Test-Bed. EURASIP Journal on Wireless Communications and Networking Special Issue: Mobile Multi-Hop Ad Hoc Networks: From Theory to Reality

Karrer, Roger and Pescapé, Antonio and Hühn, Thomas (2008). Challenges in Second-Generation Wireless Mesh Networks. EURASIP Journal on Wireless Communications and Networking. Hindawi Publishing Corporation.

Feldmann, Anja and Kind, Mario and Maennel, Olaf and Schaffrath, Gregor and Werle, Christoph (2009). Network Virtualization – An Enabler for Overcoming Ossification. ERCIM News, 21–22.

Feldmann, Anja and Schaffrath, Gregor and Schmid, Stefan (2012). CloudNets: Combining Clouds with Networking. ERCIM News, 56–57.

Agarwal, Sachin and Laifenfeld, Moshe and Hagedorn, Andrew and Trachtenberg, Ari and Alanyali, Murat (2009). Fair and Distributed Peer-to-Peer Allocation of a Common, Refillable Resource. Elsevier Journal on Parallel and Distributed Computing, 974–988.

Kermarrec, Anne-Marie and Le Merrer, Erwan and Sericola, Bruno and Trédan Gilles (2011). Second order centrality: distributed assessment of nodes importance in complex networks. Elsevier Journal of Computer Communications, 619–628.

Lu, Xiaofeng and Hui, Pan and Towsley, Don and Pu, Juahua and Xiong, Zhang (2010). Anti-localization Anonymous Routing for Delay Tolerant Network. Elsevier Computer Networks, 1899–1910.


Kuhn, Fabian and Schmid, Stefan and Wattenhofer, Roger (2010). Towards Worst-Case Churn Resistant Peer-to-Peer Systems. Distributed Computing Journal (DC). Springer, 249–267.

Guerraoui, Rachid and Kouznetsov, Petr (2008). Failure Detectors as Type Boosters. Distributed Computing Journal (DC). Springer, 343–358.

Guerraoui, Rachid and Kapalka, Michal and Kouznetsov, Petr (2008). The Weakest Failure Detectors to Boost Obstruction-Freedom. Distributed Computing Journal (DC). Springer, 415–433.

Guerraoui, Rachid and Herlihy, Maurice and Kuznetsov, Petr and Lynch, Nancy and Newport, Calvin (2009). On the Weakest Failure Detector Ever. Distributed Computing Journal (DC). Springer, 353–366.

Oswald, Yvonne Anne and Tredan, Gilles and Schmid, Stefan (2014). Adversarial Topology Discovery in Network Virtualization Environments: A Threat for ISPs?. Distributed Computing (DIST)

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe