


default search action
20th ICNP 2012: Austin, TX, USA
- 20th IEEE International Conference on Network Protocols, ICNP 2012, Austin, TX, USA, October 30 - Nov. 2, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2445-8

- Tao Feng, Jun Bi

, Hongyu Hu:
TUNOS: A novel SDN-oriented networking operating system. 1-2 - Xiaoke Jiang, Jun Bi

, You Wang, Pingping Lin, Zhaogeng Li:
A content provider mobility solution of named data networking. 1-2 - Hyojoon Kim

, Mike Schlansker, Jose Renato Santos, Jean Tourrilhes, Yoshio Turner, Nick Feamster:
CORONET: Fault tolerance for Software Defined Networks. 1-2 - Jie Li, Jun Bi

, Jianping Wu:
Umbrella: A routing choice feedback based distributed inter-domain anti-spoofing solution. 1-2 - Raimondas Sasnauskas, Philipp Kaiser, Russ Lucas Jukic, Klaus Wehrle

:
Integration testing of protocol implementations using symbolic distributed execution. 1-6 - Chen Chen, Limin Jia

, Boon Thau Loo
, Wenchao Zhou:
Reduction-based security analysis of Internet routing protocols. 1-6 - Sarah Edenhofer, Peter Höfner:

Towards a rigorous analysis of AODVv2 (DYMO). 1-6 - Vincent Rahli

, Nicolas Schiper, Robbert van Renesse, Mark Bickford
, Robert L. Constable:
A diversified and correct-by-construction broadcast service. 1-6 - Shuyuan Zhang, Abdulrahman Mahmoud, Sharad Malik

, Sanjai Narain:
Verification and synthesis of firewalls using SAT and QBF. 1-6 - Debbie Perouli, Stefano Vissicchio, Alexander J. T. Gurney, Olaf Maennel

, Timothy G. Griffin, Iain Phillips
, Sonia Fahmy
, Cristel Pelsser
:
Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic models. 1-6 - Seungwon Shin, Guofei Gu:

CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). 1-6 - Gowtham Boddapati, John Day, Ibrahim Matta

, Lubomir T. Chitkushev
:
Assessing the security of a clean-slate Internet architecture. 1-6 - Kevin Weekly, Kristofer S. J. Pister

:
Evaluating sinkhole defense techniques in RPL networks. 1-6 - Fahad A. Arshad, Gaspar Modelo-Howard, Saurabh Bagchi:

To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network. 1-6 - Ruidong Li

, Ved P. Kafle
, Hiroaki Harai:
A proactive scheme for securing ID/locator split architecture. 1-6 - Mohammad Ehdaie, Nikolaos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos

:
Key splitting for random key distribution schemes. 1-6 - Pingping Lin, Jun Bi

, Hongyu Hu:
VCP: A virtualization cloud platform for SDN intra-domain production network. 1-2 - Shou-pon Lin, Nicholas F. Maxemchuk:

An architecture for collaborative driving systems. 1-2 - Debbie Perouli, Timothy G. Griffin, Olaf Maennel

, Sonia Fahmy
, Iain Phillips
, Cristel Pelsser:
Detecting the unintended in BGP policies. 1-2 - Wenyu Ren, Yong Li, Depeng Jin, Li Su, Lieguang Zeng:

Optimal vehicles and coding decision for mobile data sharing in Vehicular Delay Tolerant Networks. 1-2 - You Wang, Jun Bi

, Chenghui Peng:
Global Resolution Service for mobility support in the internet. 1-2 - Tong Yang, Shenjiang Zhang, Xianda Sun, Huichen Dai, Ruian Duan, Jianyuan Lu, Zhian Mi, Bin Liu:

Virtual routing tables polymerization for lookup and update. 1-2 - Baobao Zhang, Jun Bi

, Jianping Wu:
AFEC: A method of aggregating forwarding equivalence classes based on overlapped paths. 1-2 - Tao Xiong, Jie Zhang, Junmei Yao, Wei Lou

:
Symbol-level detection: A new approach to silencing hidden terminals. 1-10 - Matvey Arye, Erik Nordström, Robert Kiefer, Jennifer Rexford

, Michael J. Freedman:
A formally-verified migration protocol for mobile, multi-homed hosts. 1-12 - Jun Li, Toby Ehrenkranz, Paul Elliott:

Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies. 1-10 - Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao

, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. 1-10 - Suchul Lee, Chong-kwon Kim:

D-Fi: A diversity-aware Wi-Fi using an OFDM-based Bloom filter. 1-10 - Somaya Arianfar, Pasi Sarolahti, Jörg Ott:

Marooned magic numbers - An adaptive congestion control architecture. 1-11 - Yuan Feng, Baochun Li, Bo Li:

Airlift: Video conferencing as a cloud service using inter-datacenter networks. 1-11 - Michael Schier, Michael Welzl

:
Using DCCP: Issues and improvements. 1-9 - Behnaz Arzani, Roch Guérin, Alejandro Ribeiro

:
A distributed routing protocol for predictable rates in wireless mesh networksy. 1-10 - Shaojie Tang, Jie Wu, Guihai Chen

, Cheng Wang, Xuefeng Liu, Tao Li, Xiang-Yang Li:
On minimum delay duty-cycling protocol in sustainable sensor network. 1-9 - Sohraab Soltani, Hassan Aqeel Khan

, Hayder Radha:
FAST: A channel access protocol for wireless video (and non-video) traffic. 1-10 - George Papageorgiou, Shailendra Singh, Srikanth V. Krishnamurthy

, Ramesh Govindan, Tom La Porta:
Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks. 1-10 - Jianxia Ning, Shailendra Singh, Konstantinos Pelechrinis, Bin Liu, Srikanth V. Krishnamurthy

, Ramesh Govindan:
Forensic analysis of packet losses in wireless networks. 1-10 - Lei Yu

, Karan Sapra, Haiying Shen, Lin Ye:
Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. 1-10 - Debbie Perouli, Timothy G. Griffin, Olaf Maennel

, Sonia Fahmy
, Cristel Pelsser
, Alexander J. T. Gurney, Iain Phillips
:
Detecting unsafe BGP policies in a flexible world. 1-10 - Le Chang, Jianping Pan

:
Towards the optimal caching strategies of peer-assisted VoD systems with HD channels. 1-10 - Yin Xu, Wai Kay Leong

, Ben Leong
, Ali Razeen:
Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow Control. 1-10 - Hanhua Chen, Hai Jin, Ning Jin, Tao Gu

:
Minimizing inter-server communications by exploiting self-similarity in online social networks. 1-10 - Yu Cao, Mingwei Xu, Xiaoming Fu

:
Delay-based congestion control for multipath TCP. 1-10 - Chen Qian, Simon S. Lam:

ROME: Routing on metropolitan-scale Ethernet. 1-10 - Bo Han, Aravind Srinivasan:

eDiscovery: Energy efficient device discovery for mobile opportunistic communications. 1-10 - Yong Fu, Mo Sha

, Gregory Hackmann, Chenyang Lu:
Practical control of transmission power for Wireless Sensor Networks. 1-10 - Kang Chen, Haiying Shen:

SMART: Lightweight distributed Social Map based Routing in Delay Tolerant Networks. 1-10 - Ze Li, Haiying Shen:

Social-P2P: Social network-based P2P file sharing system. 1-10 - Tong Yang, Zhian Mi, Ruian Duan, Xiaoyu Guo

, Jianyuan Lu, Shenjiang Zhang, Xianda Sun, Bin Liu:
An ultra-fast universal incremental update algorithm for trie-based routing lookup. 1-10 - Qinghua Li, Guohong Cao:

Efficient and privacy-preserving data aggregation in mobile sensing. 1-10 - Jing Zhu, Dan Li, Jianping Wu, Hongnan Liu, Ying Zhang, Jingcheng Zhang:

Towards bandwidth guarantee in multi-tenancy cloud computing networks. 1-10 - Ning Jin, Kaiji Chen, Tao Gu

:
Energy balanced data collection in Wireless Sensor Networks. 1-10 - Takeshi Kubo, Atsushi Tagami, Teruyuki Hasegawa, Toru Hasegawa, Jean C. Walrand:

Range-free localization using grid graph extraction. 1-11 - Lei Jiao

, Jun Li, Tianyin Xu, Xiaoming Fu
:
Cost optimization for Online Social Networks on geo-distributed clouds. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














