


default search action
Networking 2008: Singapore
- Amitabha Das, Hung Keng Pung, Francis Bu-Sung Lee, Lawrence Wai-Choong Wong:

NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings. Lecture Notes in Computer Science 4982, Springer 2008, ISBN 978-3-540-79548-3
Ad-Hoc and Sensor Networks
Design and Optimization
- Hervé Aïache, Vania Conan, Laure Lebrun, Jeremie Leguay

, Stéphane Rousseau, Damien Thoumin:
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking. 1-13 - Eren Gürses:

Cross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc Networks. 14-25
MAC Protocol
- Siquan Hu, Mehul Motani

:
Early Overhearing Avoidance in Wireless Sensor Networks. 26-35 - Abdelmalik Bachir, Martin Heusse, Andrzej Duda

:
Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks. 36-47
Overlay Networking
- Sandrine Calomme, Guy Leduc:

An Overlay Maintenance Protocol for Overlay Routing on Top of Ad Hoc Networks. 48-59 - Luigi Liquori

, Diego Borsetti, Claudio Casetti, Carla-Fabiana Chiasserini
:
An Overlay Architecture for Vehicular Networks. 60-71
Routing
- Hai Yan, Zhijie Jerry Shi, Jun-Hong Cui:

DBR: Depth-Based Routing for Underwater Sensor Networks. 72-86 - Trung-Tuan Luong, Bu-Sung Lee, Chai Kiat Yeo

:
Channel Allocation for Multiple Channels Multiple Interfaces Communication in Wireless Ad Hoc Networks. 87-98 - Ignacy Gawedzki, Khaldoun Al Agha:

Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing. 99-111
Miscellaneous
- Mathieu Bouet

, Guy Pujolle:
3-D Localization Schemes of RFID Tags with Static and Mobile Readers. 112-123 - Antoine Gallais

, Jean Carle:
Performance Evaluation and Enhancement of Surface Coverage Relay Protocol. 124-134 - Rachid El Azouzi

, Ralph El Khoury, Abdellatif Kobbane
, Essaid Sabir
:
On Extending Coverage of UMTS Networks Using an Ad-Hoc Network with Weighted Fair Queueing. 135-148
Next Generation Internet
Authentication
- Reed Newman, Raheem A. Beyah

:
A Performance Analysis of Authentication Using Covert Timing Channels. 149-161 - T. Rakesh Kumar, S. V. Raghavan:

PassPattern System (PPS): A Pattern-Based User Authentication Scheme. 162-169 - Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee:

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves. 170-182
Modeling and Performance Evaluation
- Almerima Jamakovic, Piet Van Mieghem:

On the Robustness of Complex Networks by Using the Algebraic Connectivity. 183-194 - Gerasimos G. Pollatos, Orestis Telelis, Vassilis Zissimopoulos:

On the Social Cost of Distributed Selfish Content Replication. 195-206 - Kacper Kurowski, Halina Tarasiuk

:
On Performance Evaluation of Handling Streaming Traffic in IP Networks Using TFRC Protocol. 207-214
Multicast
- Keen-Mun Yong, Gee-Swee Poo, Tee-Hiang Cheng:

Efficient Heuristic for Minimum Cost Trees Construction in Multi-Groups Multicast. 215-226 - György Dán, Viktória Fodor:

Delay Bounds and Scalability for Overlay Multicast. 227-239 - Jun Guo

, Sanjay Jha
:
A Distributed Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks. 240-251
Network Measurement and Testbed
- René Serral-Gracià, Albert Cabellos-Aparicio, Jordi Domingo-Pascual:

Network Performance Assessment Using Adaptive Traffic Sampling. 252-263 - Andreas Müller, Andreas Klenk, Georg Carle:

On the Applicability of Knowledge Based NAT-Traversal for Home Networks. 264-275 - Atsuo Tachibana, Yuichiro Hei, Tomohiko Ogishi, Shigehiro Ano:

IP Performance Management Infrastructure for ISP. 276-288 - Jaime Lloret, Francisco Javier Sanchez, Hugo Coll, Fernando Boronat

:
Can Critical Real-Time Services of Public Infrastructures Run over Ethernet and MPLS Networks?. 289-301 - Jun Bi, Ping Hu, Lizhong Xie:

Shim6: Reference Implementation and Optimization. 302-313 - Michael Bredel, Markus Fidler:

A Measurement Study of Bandwidth Estimation in IEEE 802.11g Wireless LANs Using the DCF. 314-325
Optical Networks
- Tomoya Kitani, Nobuo Funabiki, Hirozumi Yamaguchi

, Teruo Higashino:
Hierarchical Logical Topology in WDM Ring Networks with Limited ADMs. 326-337 - Wojciech Molisz, Jacek Rak

:
A Novel Class-Based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks. 338-345 - Miguel A. González-Ortega, José C. López-Ardao

, Pablo Jesús Argibay-Losada, Andrés Suárez-González
, Cándido López-García
, Manuel Fernández-Veiga
, Raúl Fernando Rodríguez Rubio:
End-to-End Proportional Loss Differentiation in OBS Networks. 346-357
Peer-to-Peer and Overlay Networking
- Siyu Tang, Huijuan Wang, Piet Van Mieghem:

The Effect of Peer Selection with Hopcount or Delay Constraint on Peer-to-Peer Networking. 358-365 - Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:

T2MC: A Peer-to-Peer Mismatch Reduction Technique by Traceroute and 2-Means Classification Algorithm. 366-374 - Haiyong Xie, Yang Richard Yang, Avi Silberschatz:

Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks. 375-384 - Wenzhong Li, Edward Chan, Yilin Wang, Daoxu Chen, Sanglu Lu:

Cache Placement Optimization in Hierarchical Networks: Analysis and Performance Evaluation. 385-396 - Mohamed Ali Kâafar

, Bamba Gueye
, François Cantin, Guy Leduc, Laurent Mathy:
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations. 397-408
Peer-to-Peer Services
- Zhenyu Li, Zengyang Zhu, Gaogang Xie, Zhongcheng Li:

Efficient Multi-source Data Dissemination in Peer-to-Peer Networks. 409-420 - Niklas Carlsson, Derek L. Eager:

Modeling Priority-Based Incentive Policies for Peer-Assisted Content Delivery Systems. 421-432 - Yang Guo, Chao Liang, Yong Liu

:
AQCS: Adaptive Queue-Based Chunk Scheduling for P2P Live Streaming. 433-444 - Yue Lu, Fernando A. Kuipers, Milena Janic, Piet Van Mieghem:

E2E Blocking Probability of IPTV and P2PTV. 445-456 - Eva Jaho

, Ioannis Z. Koukoutsidis, Ioannis Stavrakakis
, Ina Jaho:
Cooperative Replication in Content Networks with Nodes under Churn. 457-469
QoS
- Marc-Antoine Weisser, Joanna Tomasik, Dominique Barth:

Congestion Avoiding Mechanism Based on Inter-domain Hierarchy. 470-481 - Walid Htira, Olivier Dugeon, Michel Diaz:

A Novel Bandwidth Broker Architecture Based on Topology Aggregation in Delay|Bandwidth Sensitive Networks. 482-493 - Grenville J. Armitage:

Client-Side Adaptive Search Optimisation for Online Game Server Discovery. 494-505 - Ignacio Más Ivars, Gunnar Karlsson

:
A Model for Endpoint Admission Control Based on Packet Loss. 506-517
Routing
- Jing Fu, Peter Sjödin, Gunnar Karlsson

:
Convergence of Intra-domain Routing with Centralized Control. 518-529 - Gene Moo Lee

, Taehwan Choi:
Improving the Interaction between Overlay Routing and Traffic Engineering. 530-541 - Marc-Olivier Buob, Steve Uhlig

, Mickael Meulle:
Designing Optimal iBGP Route-Reflection Topologies. 542-553 - Qi Li, Mingwei Xu, Lingtao Pan, Yong Cui:

A Study of Path Protection in Self-Healing Routing. 554-561 - Mohammad Behdadfar, Hossein Saidi

:
The CPBT: A Method for Searching the Prefixes Using Coded Prefixes in B-Tree. 562-573 - Chansook Lim, Stephan Bohacek, João P. Hespanha, Katia Obraczka:

On the Effectiveness of Proactive Path-Diversity Based Routing for Robustness to Path Failures. 574-585
Security
- Thomas Dreibholz

, Erwin P. Rathgeb, Xing Zhou:
On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. 586-598 - Guanhua Yan, Stephan J. Eidenbenz

:
DDoS Mitigation in Non-cooperative Environments. 599-611 - Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel:

Generalized Self-healing Key Distribution Using Vector Space Access Structure. 612-623 - Brandon Shirley, Chad D. Mano:

A Model for Covert Botnet Communication in a Private Subnet. 624-632
Traffic Engineering
- Jing Fu, Peter Sjödin, Gunnar Karlsson

:
Traffic Engineering and Routing in IP Networks with Centralized Control. 633-641 - Mohand Yazid Saidi, Bernard Cousin

, Jean-Louis Le Roux:
Distributed PLR-Based Backup Path Computation in MPLS Networks. 642-653 - Ning Wang

, Kin-Hon Ho, George Pavlou:
Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network Performance. 654-666
Transport Protocols
- Mark Shifrin

, Isaac Keslassy:
Modeling TCP in Small-Buffer Networks. 667-678 - Mario Barbera, Mario Gerla, Alfio Lombardo

, Carla Panarello, M. Y. Sanadidi, Giovanni Schembra
:
Active Window Management: Performance Assessment through an Extensive Comparison with XCP. 679-690 - Ioannis Psaras, Vassilis Tsaoussidis

:
AIRA: Additive Increase Rate Accelerator. 691-702 - Michael Scharf, Haiko Strotbek:

Performance Evaluation of Quick-Start TCP with a Linux Kernel Implementation. 703-714 - Dino Martin López-Pacheco, Laurent Lefèvre, CongDuc Pham:

Lightweight Fairness Solutions for XCP and TCP Cohabitation. 715-726 - Preethi Natarajan, Nasif Ekiz, Paul D. Amer, Janardhan R. Iyengar, Randall R. Stewart:

Concurrent Multipath Transfer Using SCTP Multihoming: Introducing the Potentially-Failed Destination State. 727-734
Miscellaneous
- Felipe García-Sánchez, Antonio-Javier García-Sánchez

, Joan García-Haro
:
Energy-Efficient Mobile Middleware for SIP on Ubiquitous Multimedia Systems. 735-747 - Damien Leroy, Olivier Bonaventure:

A Secure Mechanism for Address Block Allocation and Distribution. 748-755 - Neha Udar, Krishna Kant, R. Viswanathan:

Asset Localization in Data Centers Using WUSB Radios. 756-767 - Gaspar Pedreño, Juan J. Alcaraz

, Fernando Cerdán
, Joan García-Haro
:
Improving the Performance of DCH Timing Adjustment in 3G Networks. 768-779
Wireless Networks
MAC Performance
- Weihua Helen Xi, Alistair Munro, Michael Barton:

Link Adaptation Algorithm for the IEEE 802.11n MIMO System. 780-791 - Katarzyna Kosek, Marek Natkaniec, Luca Vollero:

Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes. 792-803 - Johannes Lessmann, Dirk Held:

A Mobility-Adaptive TDMA MAC for Real-Time Data in Wireless Networks. 804-811 - Haithem Al-Mefleh

, J. Morris Chang:
High Performance Distributed Coordination Function for Wireless LANs. 812-823 - Haithem Al-Mefleh

, J. Morris Chang:
Turning Hidden Nodes into Helper Nodes in IEEE 802.11 Wireless LAN Networks. 824-835 - Ashwin Rao

, Arzad Alam Kherani, Anirban Mahanti:
Performance Evaluation of 802.11 Broadcasts for A Single Cell Network With Unsaturated Nodes. 836-847
Mesh Networks
- Suk Yu Hui, Kai-Hau Yeung

, Kin Yeung Wong:
Optimal Placement of Mesh Points in Wireless Mesh Networks. 848-855 - Yuan-Chieh Lin, Shun-Wen Hsiao

, Li-Ping Tung, Yeali S. Sun, Meng Chang Chen:
A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial Reuse for Wireless Mesh Networks. 856-864 - Martin Krebs, Karl-Heinz Krempels, Markus Kucay:

A Unified Service Discovery Architecture for Wireless Mesh Networks. 865-876
Mixed Networks
- Huaiyu Liu, Christian Maciocco, Vijay Kesavan:

Using Predictive Triggers to Improve Handover Performance in Mixed Networks. 877-888 - Deyun Gao, Jianfei Cai

, Chuan Heng Foh
:
Medium Access Cooperations for Improving VoIP Capacity over Hybrid 802.16/802.11 Cognitive Radio Networks. 889-900
Miscellaneous
- Saad Biaz, Shaoen Wu:

ERA: Effective Rate Adaptation for WLANs. 901-913 - Sonia Waharte, Raouf Boutaba:

On the Probability of Finding Non-interfering Paths in Wireless Multihop Networks. 914-921 - Osama Bazan, Muhammad Jaseemuddin:

Multi-commodity Flow Problem for Multi-hop Wireless Networks with Realistic Smart Antenna Model. 922-929 - Eitan Altman, Rachid El Azouzi

, Yezekael Hayel, Hamidou Tembine
:
Evolutionary Power Control Games in Wireless Networks. 930-942

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














