default search action
13th ICNP 2005: Boston, MA, USA
- 13th IEEE International Conference on Network Protocols (ICNP 2005), 6-9 November 2005, Boston, MA, USA. IEEE Computer Society 2005, ISBN 0-7695-2437-0
Cover
- Title Page.
- Copyright.
Introduction
- Message from the General Co-chairs.
- Message from the Technical Committee Co-chairs.
- Committees.
- External Reviewers.
Interdomain Routing
- Ramesh Viswanathan, Krishan K. Sabnani, Robert J. Holt, Arun N. Netravali:
Expected Convergence Properties of BGP. 3-15 - Hao Wang, Haiyong Xie, Yang Richard Yang, Avi Silberschatz, Li Erran Li, Yanbin Liu:
Stable Egress Route Selection for Interdomain Traffic Engineering: Model and Analysis. 16-29 - Feng Wang, Lixin Gao, Jia Wang, Jian Qiu:
On Understanding of Transient Interdomain Routing Failures. 30-39 - Hao Wang, Haiyong Xie, Yang Richard Yang, Avi Silberschatz, Li Erran Li, Yanbin Liu:
On the Stability of Rational, Heterogeneous Interdomain Route Selection. 40-52
Sensor and Ad-Hoc Protocols
- Sandip Bapat, Vinodkrishnan Kulathumani, Anish Arora:
Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network Experiment. 53-62 - Guanghui He, Jennifer C. Hou:
Tracking Targets with Quality inWireless Sensor Networks. 63-74 - Yan Gao, Dah-Ming Chiu, John C. S. Lui:
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks. 75-84 - Karthikeyan Sundaresan, Raghupathy Sivakumar:
Routing in Ad-hoc Networks with MIMO Links. 85-98
Peer-to-Peer Protocols
- Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo:
MuON: Epidemic Based Mutual Anonymity. 99-109 - Daniel R. Figueiredo, Jonathan K. Shapiro, Donald F. Towsley:
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems. 110-121 - Hongbo Jiang, Shudong Jin:
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks. 122-131 - Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, Ben Y. Zhao:
Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol. 132-146
Geographic Routing in Ad-Hoc Networks
- Ben Leong, Sayan Mitra, Barbara Liskov:
Path Vector Face Routing: Geographic Routing with Local Face Information. 147-158 - Daejoong Kim, Nicholas F. Maxemchuk:
Simple Robotic Routing in Ad Hoc Networks. 159-168 - Menghow Lim, Adam Chesterfield, Jon Crowcroft, Julian Chesterfield:
Landmark Guided Forwarding. 169-178 - Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu:
Efficient Hop ID based Routing for Sparse Ad Hoc Networks. 179-190
Overlay Protocols
- Weifeng Chen, James F. Kurose, Donald F. Towsley, Zihui Ge:
Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events. 191-200 - Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone:
Can coexisting overlays inadvertently step on each other? 201-214
Dimensioning and Traffic Engineering
- Chun Zhang, James F. Kurose, Donald F. Towsley, Zihui Ge, Yong Liu:
Optimal Routing with Multiple Traffic Matrices Tradeoff between Average andWorst Case Performance. 215-224 - Yaqing Huang, Roch Guérin:
Does Over-Provisioning Become More or Less Efficient as Networks Grow Larger?. 225-235 - Sharad Agarwal, Antonio Nucci, Supratik Bhattacharyya:
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic. 236-245 - Sneha Kumar Kasera, José Pinheiro, Catherine Loader, Tom LaPorta, Mehmet Karaul, Adiseshu Hari:
Robust Multiclass Signaling Overload Control. 246-258
Security and Safety
- Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero:
Modeling and Verification of IPSec and VPN Security Policies. 259-278 - Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. 269-278 - Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
A Family of Collusion Resistant Protocols for Instantiating Security. 279-288 - Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, Ibrahim Matta:
Typed Abstraction of Complex Network Compositions. 289-300
Congestion Control
- Honggang Zhang, Donald F. Towsley, Weibo Gong:
TCP Connection Game: A Study on the Selfish Behavior of TCP Users. 301-310 - Tobias Harks, Tobias Poschwatta:
Priority Pricing in Utility Fair Networks. 311-320 - Jonathan K. Shapiro, C. V. Hollot, Donald F. Towsley:
Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking. 321-331 - Mohamed A. El-Gendy, Kang G. Shin, Hosam K. Fathy:
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements. 332-344
Protocol Implementation
- Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov:
On Static and Dynamic Partitioning Behavior of Large-Scale Networks. 345-357 - Haoyu Song, Jonathan S. Turner, John W. Lockwood:
Shape Shifting Tries for Faster IP Route Lookup. 358-367 - Qunfeng Dong, Suman Banerjee, Micah Adler, Kazu Hirata:
Efficient Probabilistic Packet Marking. 368-377 - Sevcan Bilir, Kamil Saraç, Turgay Korkmaz:
Intersection Characteristics of End-to-End Internet Paths and Trees. 378-390
Wireless Transport
- Yu Dong, David K. Y. Yau:
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication. 391-400 - Guohua Zhang, Yiyu Wu, Yonghe Liu:
Stability and Sensitivity for Congestion Control in Wireless Networks with Time Varying Link Capacities. 401-412
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.