default search action
20th ICNP 2012: Austin, TX, USA
- 20th IEEE International Conference on Network Protocols, ICNP 2012, Austin, TX, USA, October 30 - Nov. 2, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2445-8
- Tao Feng, Jun Bi, Hongyu Hu:
TUNOS: A novel SDN-oriented networking operating system. 1-2 - Xiaoke Jiang, Jun Bi, You Wang, Pingping Lin, Zhaogeng Li:
A content provider mobility solution of named data networking. 1-2 - Hyojoon Kim, Mike Schlansker, Jose Renato Santos, Jean Tourrilhes, Yoshio Turner, Nick Feamster:
CORONET: Fault tolerance for Software Defined Networks. 1-2 - Jie Li, Jun Bi, Jianping Wu:
Umbrella: A routing choice feedback based distributed inter-domain anti-spoofing solution. 1-2 - Raimondas Sasnauskas, Philipp Kaiser, Russ Lucas Jukic, Klaus Wehrle:
Integration testing of protocol implementations using symbolic distributed execution. 1-6 - Chen Chen, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Reduction-based security analysis of Internet routing protocols. 1-6 - Sarah Edenhofer, Peter Höfner:
Towards a rigorous analysis of AODVv2 (DYMO). 1-6 - Vincent Rahli, Nicolas Schiper, Robbert van Renesse, Mark Bickford, Robert L. Constable:
A diversified and correct-by-construction broadcast service. 1-6 - Shuyuan Zhang, Abdulrahman Mahmoud, Sharad Malik, Sanjai Narain:
Verification and synthesis of firewalls using SAT and QBF. 1-6 - Debbie Perouli, Stefano Vissicchio, Alexander J. T. Gurney, Olaf Maennel, Timothy G. Griffin, Iain Phillips, Sonia Fahmy, Cristel Pelsser:
Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic models. 1-6 - Seungwon Shin, Guofei Gu:
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). 1-6 - Gowtham Boddapati, John Day, Ibrahim Matta, Lubomir T. Chitkushev:
Assessing the security of a clean-slate Internet architecture. 1-6 - Kevin Weekly, Kristofer S. J. Pister:
Evaluating sinkhole defense techniques in RPL networks. 1-6 - Fahad A. Arshad, Gaspar Modelo-Howard, Saurabh Bagchi:
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network. 1-6 - Ruidong Li, Ved P. Kafle, Hiroaki Harai:
A proactive scheme for securing ID/locator split architecture. 1-6 - Mohammad Ehdaie, Nikolaos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos:
Key splitting for random key distribution schemes. 1-6 - Pingping Lin, Jun Bi, Hongyu Hu:
VCP: A virtualization cloud platform for SDN intra-domain production network. 1-2 - Shou-pon Lin, Nicholas F. Maxemchuk:
An architecture for collaborative driving systems. 1-2 - Debbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Iain Phillips, Cristel Pelsser:
Detecting the unintended in BGP policies. 1-2 - Wenyu Ren, Yong Li, Depeng Jin, Li Su, Lieguang Zeng:
Optimal vehicles and coding decision for mobile data sharing in Vehicular Delay Tolerant Networks. 1-2 - You Wang, Jun Bi, Chenghui Peng:
Global Resolution Service for mobility support in the internet. 1-2 - Tong Yang, Shenjiang Zhang, Xianda Sun, Huichen Dai, Ruian Duan, Jianyuan Lu, Zhian Mi, Bin Liu:
Virtual routing tables polymerization for lookup and update. 1-2 - Baobao Zhang, Jun Bi, Jianping Wu:
AFEC: A method of aggregating forwarding equivalence classes based on overlapped paths. 1-2 - Tao Xiong, Jie Zhang, Junmei Yao, Wei Lou:
Symbol-level detection: A new approach to silencing hidden terminals. 1-10 - Matvey Arye, Erik Nordström, Robert Kiefer, Jennifer Rexford, Michael J. Freedman:
A formally-verified migration protocol for mobile, multi-homed hosts. 1-12 - Jun Li, Toby Ehrenkranz, Paul Elliott:
Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies. 1-10 - Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. 1-10 - Suchul Lee, Chong-kwon Kim:
D-Fi: A diversity-aware Wi-Fi using an OFDM-based Bloom filter. 1-10 - Somaya Arianfar, Pasi Sarolahti, Jörg Ott:
Marooned magic numbers - An adaptive congestion control architecture. 1-11 - Yuan Feng, Baochun Li, Bo Li:
Airlift: Video conferencing as a cloud service using inter-datacenter networks. 1-11 - Michael Schier, Michael Welzl:
Using DCCP: Issues and improvements. 1-9 - Behnaz Arzani, Roch Guérin, Alejandro Ribeiro:
A distributed routing protocol for predictable rates in wireless mesh networksy. 1-10 - Shaojie Tang, Jie Wu, Guihai Chen, Cheng Wang, Xuefeng Liu, Tao Li, Xiang-Yang Li:
On minimum delay duty-cycling protocol in sustainable sensor network. 1-9 - Sohraab Soltani, Hassan Aqeel Khan, Hayder Radha:
FAST: A channel access protocol for wireless video (and non-video) traffic. 1-10 - George Papageorgiou, Shailendra Singh, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta:
Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks. 1-10 - Jianxia Ning, Shailendra Singh, Konstantinos Pelechrinis, Bin Liu, Srikanth V. Krishnamurthy, Ramesh Govindan:
Forensic analysis of packet losses in wireless networks. 1-10 - Lei Yu, Karan Sapra, Haiying Shen, Lin Ye:
Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. 1-10 - Debbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Cristel Pelsser, Alexander J. T. Gurney, Iain Phillips:
Detecting unsafe BGP policies in a flexible world. 1-10 - Le Chang, Jianping Pan:
Towards the optimal caching strategies of peer-assisted VoD systems with HD channels. 1-10 - Yin Xu, Wai Kay Leong, Ben Leong, Ali Razeen:
Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow Control. 1-10 - Hanhua Chen, Hai Jin, Ning Jin, Tao Gu:
Minimizing inter-server communications by exploiting self-similarity in online social networks. 1-10 - Yu Cao, Mingwei Xu, Xiaoming Fu:
Delay-based congestion control for multipath TCP. 1-10 - Chen Qian, Simon S. Lam:
ROME: Routing on metropolitan-scale Ethernet. 1-10 - Bo Han, Aravind Srinivasan:
eDiscovery: Energy efficient device discovery for mobile opportunistic communications. 1-10 - Yong Fu, Mo Sha, Gregory Hackmann, Chenyang Lu:
Practical control of transmission power for Wireless Sensor Networks. 1-10 - Kang Chen, Haiying Shen:
SMART: Lightweight distributed Social Map based Routing in Delay Tolerant Networks. 1-10 - Ze Li, Haiying Shen:
Social-P2P: Social network-based P2P file sharing system. 1-10 - Tong Yang, Zhian Mi, Ruian Duan, Xiaoyu Guo, Jianyuan Lu, Shenjiang Zhang, Xianda Sun, Bin Liu:
An ultra-fast universal incremental update algorithm for trie-based routing lookup. 1-10 - Qinghua Li, Guohong Cao:
Efficient and privacy-preserving data aggregation in mobile sensing. 1-10 - Jing Zhu, Dan Li, Jianping Wu, Hongnan Liu, Ying Zhang, Jingcheng Zhang:
Towards bandwidth guarantee in multi-tenancy cloud computing networks. 1-10 - Ning Jin, Kaiji Chen, Tao Gu:
Energy balanced data collection in Wireless Sensor Networks. 1-10 - Takeshi Kubo, Atsushi Tagami, Teruyuki Hasegawa, Toru Hasegawa, Jean C. Walrand:
Range-free localization using grid graph extraction. 1-11 - Lei Jiao, Jun Li, Tianyin Xu, Xiaoming Fu:
Cost optimization for Online Social Networks on geo-distributed clouds. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.