


default search action
15th ICNP 2007: Beijing, China
- Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China. IEEE Computer Society 2007, ISBN 1-4244-1588-8

Wireless mesh networks
- Guo-Kai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt W. Mutka

:
Multicast Algorithms for Multi-Channel Wireless Mesh Networks. 1-10 - Yang Song, Chi Zhang, Yuguang Fang

:
Throughput Maximization in Multi-channel Wireless Mesh Access Networks. 11-20 - Theodoros Salonidis, Michele Garetto

, Amit Saha, Edward W. Knightly:
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach. 21-30 - Andrea G. Forte, Henning Schulzrinne:

Cooperation Between Stations in Wireless Networks. 31-40
Sensor and RFID networks
- Mohamed Hefeeda

, Hossein Ahmadi:
A Probabilistic Coverage Protocol for Wireless Sensor Networks. 41-50 - Ossama Younis, Marwan Krunz, Srinivasan Ramasubramanian:

Coverage Without Location Information. 51-60 - Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianjin Zhu:

Slotted Scheduled Tag Access in Multi-Reader RFID Systems. 61-70 - Ben Leong

, Barbara Liskov, Robert Morris:
Greedy Virtual Coordinates for Geographic Routing. 71-80
Interdomain routing
- Franck Le, Geoffrey G. Xie, Hui Zhang:

Understanding Route Redistribution. 81-92 - Mohit Lad, Ricardo V. Oliveira, Daniel Massey, Lixia Zhang:

Inferring the Origin of Routing Changes using Link Weights. 93-102 - Ricardo V. Oliveira, Mohit Lad, Beichuan Zhang, Lixia Zhang:

Geographically Informed Inter-Domain Routing. 103-112 - Alexander J. T. Gurney, Timothy G. Griffin:

Lexicographic products in metarouting. 113-122
Wireless LANs
- Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang:

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs. 123-132 - Eric Rozner, Yogita Mehta, Aditya Akella, Lili Qiu:

Traffic-Aware Channel Assignment in Enterprise Wireless LANs. 133-143 - Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon Kim:

Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANs. 144-153 - Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang:

Scheduled PSM for Minimizing Energy in Wireless LANs. 154-163
Network security
- Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu:

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. 164-173 - Amit Mondal, Aleksandar Kuzmanovic:

A Poisoning-Resilient TCP Stack. 174-183 - Jakob Eriksson, Michalis Faloutsos

, Srikanth V. Krishnamurthy
:
Routing amid Colluding Attackers. 184-193 - Katerina J. Argyraki

, Petros Maniatis, Olga Irzak, Subramanian Ashish, Scott Shenker:
Loss and Delay Accountability for the Internet. 194-205
Rate and congestion control
- Xiaomeng Huang, Chuang Lin, Fengyuan Ren, Guangwen Yang, Peter D. Ungsunan, Yuanzhuo Wang:

Improving the Convergence and Stability of Congestion Control Algorithm. 206-215 - Bin Zhou, Cheng Peng Fu, Victor O. K. Li:

TFRC Veno: An Enhancement of TCP Friendly Rate Control over Wired/Wireless Networks. 216-225 - Yipeng Zhou

, Dah-Ming Chiu, John C. S. Lui:
A Simple Model for Analyzing P2P Streaming Protocols. 226-235 - S. Ramesh, Sneha Kumar Kasera:

Best Effort Session-Level Congestion Control. 236-245
Protocol implementation
- Sailesh Kumar, Jonathan S. Turner, Patrick Crowley, Michael Mitzenmacher:

HEXA: Compact Data Structures for Faster Packet Processing. 246-255 - Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith:

A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations. 256-265 - Chad R. Meiners, Alex X. Liu, Eric Torng:

TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs. 266-275 - Jianping Wu, Gang Ren, Xing Li:

Source Address Validation: Architecture and Protocol Design. 276-283
Firewalls and privacy
- Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu:

Design and Implementation of Cross-Domain Cooperative Firewall. 284-293 - Taghrid Samak, Adel El-Atawy

, Ehab Al-Shaer:
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. 294-303 - Karim M. El Defrawy, Gene Tsudik:

ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. 304-313 - Kiran Mehta, Donggang Liu, Matthew K. Wright

:
Location Privacy in Sensor Networks Against a Global Eavesdropper. 314-323
Posters Session
- Konrad Iwanicki

, Maarten van Steen
:
PL-Gossip: Area Hierarchy Maintenance in Large-Scale Wireless Sensor Networks. 324-325 - Jilin Le, John C. S. Lui, Dah-Ming Chiu:

Towards Coding-Efficient Link-Scheduling and Coding-Aware Routing in Wireless Networks. 326-327 - Yuan He, Yunhao Liu:

Supporting VCR in Peer-to-Peer Video-On-Demand. 328-329 - Ka-Hung Hui, On-Ching Yue, Wing Cheong Lau:

FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA. 330-331 - Maxim Podlesny, Sergey Gorinsky

:
Price of Asynchrony: Queuing under Ideally Smooth Congestion Control. 332-333 - Kenta Yasukawa, Andrea G. Forte, Henning Schulzrinne:

Distributed Delay Estimation and Call Admission Control in IEEE 802.11 WLANs. 334-335 - Na Li, David Lee:

Network Court Protocol and Malicious Node Conviction. 336-337 - Lin Chen, Jean Leneutre:

A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs. 338-339 - Yang Li, Binxing Fang:

A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. 340-341 - Tayseer A. Al-Khdour, Uthman A. Baroudi

:
An Entropy-Based Throughput Metric for Fairly Evaluating WSN Routing Protocols. 342-343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














