default search action
15th ICNP 2007: Beijing, China
- Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China. IEEE Computer Society 2007, ISBN 1-4244-1588-8
Wireless mesh networks
- Guo-Kai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt W. Mutka:
Multicast Algorithms for Multi-Channel Wireless Mesh Networks. 1-10 - Yang Song, Chi Zhang, Yuguang Fang:
Throughput Maximization in Multi-channel Wireless Mesh Access Networks. 11-20 - Theodoros Salonidis, Michele Garetto, Amit Saha, Edward W. Knightly:
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach. 21-30 - Andrea G. Forte, Henning Schulzrinne:
Cooperation Between Stations in Wireless Networks. 31-40
Sensor and RFID networks
- Mohamed Hefeeda, Hossein Ahmadi:
A Probabilistic Coverage Protocol for Wireless Sensor Networks. 41-50 - Ossama Younis, Marwan Krunz, Srinivasan Ramasubramanian:
Coverage Without Location Information. 51-60 - Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianjin Zhu:
Slotted Scheduled Tag Access in Multi-Reader RFID Systems. 61-70 - Ben Leong, Barbara Liskov, Robert Tappan Morris:
Greedy Virtual Coordinates for Geographic Routing. 71-80
Interdomain routing
- Franck Le, Geoffrey G. Xie, Hui Zhang:
Understanding Route Redistribution. 81-92 - Mohit Lad, Ricardo V. Oliveira, Daniel Massey, Lixia Zhang:
Inferring the Origin of Routing Changes using Link Weights. 93-102 - Ricardo V. Oliveira, Mohit Lad, Beichuan Zhang, Lixia Zhang:
Geographically Informed Inter-Domain Routing. 103-112 - Alexander J. T. Gurney, Timothy G. Griffin:
Lexicographic products in metarouting. 113-122
Wireless LANs
- Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang:
PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs. 123-132 - Eric Rozner, Yogita Mehta, Aditya Akella, Lili Qiu:
Traffic-Aware Channel Assignment in Enterprise Wireless LANs. 133-143 - Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon Kim:
Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANs. 144-153 - Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang:
Scheduled PSM for Minimizing Energy in Wireless LANs. 154-163
Network security
- Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu:
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. 164-173 - Amit Mondal, Aleksandar Kuzmanovic:
A Poisoning-Resilient TCP Stack. 174-183 - Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy:
Routing amid Colluding Attackers. 184-193 - Katerina J. Argyraki, Petros Maniatis, Olga Irzak, Subramanian Ashish, Scott Shenker:
Loss and Delay Accountability for the Internet. 194-205
Rate and congestion control
- Xiaomeng Huang, Chuang Lin, Fengyuan Ren, Guangwen Yang, Peter D. Ungsunan, Yuanzhuo Wang:
Improving the Convergence and Stability of Congestion Control Algorithm. 206-215 - Bin Zhou, Cheng Peng Fu, Victor O. K. Li:
TFRC Veno: An Enhancement of TCP Friendly Rate Control over Wired/Wireless Networks. 216-225 - Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui:
A Simple Model for Analyzing P2P Streaming Protocols. 226-235 - S. Ramesh, Sneha Kumar Kasera:
Best Effort Session-Level Congestion Control. 236-245
Protocol implementation
- Sailesh Kumar, Jonathan S. Turner, Patrick Crowley, Michael Mitzenmacher:
HEXA: Compact Data Structures for Faster Packet Processing. 246-255 - Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith:
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations. 256-265 - Chad R. Meiners, Alex X. Liu, Eric Torng:
TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs. 266-275 - Jianping Wu, Gang Ren, Xing Li:
Source Address Validation: Architecture and Protocol Design. 276-283
Firewalls and privacy
- Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu:
Design and Implementation of Cross-Domain Cooperative Firewall. 284-293 - Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer:
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. 294-303 - Karim M. El Defrawy, Gene Tsudik:
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. 304-313 - Kiran Mehta, Donggang Liu, Matthew K. Wright:
Location Privacy in Sensor Networks Against a Global Eavesdropper. 314-323
Posters Session
- Konrad Iwanicki, Maarten van Steen:
PL-Gossip: Area Hierarchy Maintenance in Large-Scale Wireless Sensor Networks. 324-325 - Jilin Le, John C. S. Lui, Dah-Ming Chiu:
Towards Coding-Efficient Link-Scheduling and Coding-Aware Routing in Wireless Networks. 326-327 - Yuan He, Yunhao Liu:
Supporting VCR in Peer-to-Peer Video-On-Demand. 328-329 - Ka-Hung Hui, On-Ching Yue, Wing Cheong Lau:
FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA. 330-331 - Maxim Podlesny, Sergey Gorinsky:
Price of Asynchrony: Queuing under Ideally Smooth Congestion Control. 332-333 - Kenta Yasukawa, Andrea G. Forte, Henning Schulzrinne:
Distributed Delay Estimation and Call Admission Control in IEEE 802.11 WLANs. 334-335 - Na Li, David Lee:
Network Court Protocol and Malicious Node Conviction. 336-337 - Lin Chen, Jean Leneutre:
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs. 338-339 - Yang Li, Binxing Fang:
A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. 340-341 - Tayseer A. Al-Khdour, Uthman A. Baroudi:
An Entropy-Based Throughput Metric for Fairly Evaluating WSN Routing Protocols. 342-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.