


default search action
13th ICNP 2005: Boston, MA, USA
- 13th IEEE International Conference on Network Protocols (ICNP 2005), 6-9 November 2005, Boston, MA, USA. IEEE Computer Society 2005, ISBN 0-7695-2437-0

Cover
- Title Page.

- Copyright.

Introduction
- Message from the General Co-chairs.

- Message from the Technical Committee Co-chairs.

- Committees.

- External Reviewers.

Interdomain Routing
- Ramesh Viswanathan, Krishan K. Sabnani, Robert J. Holt, Arun N. Netravali:

Expected Convergence Properties of BGP. 3-15 - Hao Wang, Haiyong Xie, Yang Richard Yang, Avi Silberschatz, Li Erran Li, Yanbin Liu:

Stable Egress Route Selection for Interdomain Traffic Engineering: Model and Analysis. 16-29 - Feng Wang

, Lixin Gao, Jia Wang, Jian Qiu:
On Understanding of Transient Interdomain Routing Failures. 30-39 - Hao Wang, Haiyong Xie, Yang Richard Yang, Avi Silberschatz, Li Erran Li, Yanbin Liu:

On the Stability of Rational, Heterogeneous Interdomain Route Selection. 40-52
Sensor and Ad-Hoc Protocols
- Sandip Bapat, Vinodkrishnan Kulathumani, Anish Arora:

Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network Experiment. 53-62 - Guanghui He, Jennifer C. Hou:

Tracking Targets with Quality inWireless Sensor Networks. 63-74 - Yan Gao, Dah-Ming Chiu, John C. S. Lui:

The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks. 75-84 - Karthikeyan Sundaresan, Raghupathy Sivakumar:

Routing in Ad-hoc Networks with MIMO Links. 85-98
Peer-to-Peer Protocols
- Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo:

MuON: Epidemic Based Mutual Anonymity. 99-109 - Daniel R. Figueiredo

, Jonathan K. Shapiro, Donald F. Towsley
:
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems. 110-121 - Hongbo Jiang, Shudong Jin:

Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks. 122-131 - Qiao Lian, Wei Chen

, Zheng Zhang, Shaomei Wu, Ben Y. Zhao:
Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol. 132-146
Geographic Routing in Ad-Hoc Networks
- Ben Leong

, Sayan Mitra
, Barbara Liskov:
Path Vector Face Routing: Geographic Routing with Local Face Information. 147-158 - Daejoong Kim, Nicholas F. Maxemchuk:

Simple Robotic Routing in Ad Hoc Networks. 159-168 - Menghow Lim, Adam Chesterfield, Jon Crowcroft, Julian Chesterfield:

Landmark Guided Forwarding. 169-178 - Yao Zhao, Bo Li, Qian Zhang

, Yan Chen, Wenwu Zhu:
Efficient Hop ID based Routing for Sparse Ad Hoc Networks. 179-190
Overlay Protocols
- Weifeng Chen, James F. Kurose, Donald F. Towsley

, Zihui Ge:
Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events. 191-200 - Ram Keralapura, Chen-Nee Chuah

, Nina Taft, Gianluca Iannaccone:
Can coexisting overlays inadvertently step on each other? 201-214
Dimensioning and Traffic Engineering
- Chun Zhang, James F. Kurose, Donald F. Towsley

, Zihui Ge, Yong Liu
:
Optimal Routing with Multiple Traffic Matrices Tradeoff between Average andWorst Case Performance. 215-224 - Yaqing Huang, Roch Guérin:

Does Over-Provisioning Become More or Less Efficient as Networks Grow Larger?. 225-235 - Sharad Agarwal, Antonio Nucci, Supratik Bhattacharyya:

Measuring the Shared Fate of IGP Engineering and Interdomain Traffic. 236-245 - Sneha Kumar Kasera, José Pinheiro, Catherine Loader

, Tom LaPorta, Mehmet Karaul, Adiseshu Hari:
Robust Multiclass Signaling Overload Control. 246-258
Security and Safety
- Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero:

Modeling and Verification of IPSec and VPN Security Policies. 259-278 - Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi

:
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. 269-278 - Sandeep S. Kulkarni, Bezawada Bruhadeshwar

:
A Family of Collusion Resistant Protocols for Instantiating Security. 279-288 - Azer Bestavros

, Adam D. Bradley, Assaf J. Kfoury, Ibrahim Matta
:
Typed Abstraction of Complex Network Compositions. 289-300
Congestion Control
- Honggang Zhang, Donald F. Towsley

, Weibo Gong:
TCP Connection Game: A Study on the Selfish Behavior of TCP Users. 301-310 - Tobias Harks, Tobias Poschwatta:

Priority Pricing in Utility Fair Networks. 311-320 - Jonathan K. Shapiro, C. V. Hollot, Donald F. Towsley

:
Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking. 321-331 - Mohamed A. El-Gendy, Kang G. Shin, Hosam K. Fathy:

CONNET: Self-Controlled Access Links for Delay and Jitter Requirements. 332-344
Protocol Implementation
- Derek Leonard, Zhongmei Yao

, Xiaoming Wang, Dmitri Loguinov:
On Static and Dynamic Partitioning Behavior of Large-Scale Networks. 345-357 - Haoyu Song

, Jonathan S. Turner, John W. Lockwood:
Shape Shifting Tries for Faster IP Route Lookup. 358-367 - Qunfeng Dong, Suman Banerjee, Micah Adler, Kazu Hirata:

Efficient Probabilistic Packet Marking. 368-377 - Sevcan Bilir, Kamil Saraç, Turgay Korkmaz:

Intersection Characteristics of End-to-End Internet Paths and Trees. 378-390
Wireless Transport
- Yu Dong, David K. Y. Yau:

Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication. 391-400 - Guohua Zhang, Yiyu Wu, Yonghe Liu:

Stability and Sensitivity for Congestion Control in Wireless Networks with Time Varying Link Capacities. 401-412

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














