Abstract is missing.
- Message from the program chairsSandra R. Thuel, Yuanyuan Yang. [doi]
- Message from the general chairLuiz A. DaSilva. [doi]
- Network diversification-enabling innovation in network architecture and servicesJonathan S. Turner. 3 [doi]
- Design and analysis of connected dominating set formation for topology control in wireless ad hoc networksBo Han, Weijia Jia. 7-12 [doi]
- Coverage-based probabilistic forwarding in ad hoc routingHui Ling, Daniel Mossé, Taieb Znati. 13-18 [doi]
- A practical spanning tree based MANET routing algorithmWuxu Peng, Zhuojing Li, F. Furman Haddix. 19-24 [doi]
- Stability and hop-count based approach for route computation in MANETK. N. Sridhar, Mun Choon Chan. 25-31 [doi]
- Supporting disconnection operations through cooperative hoardingKwong Yuen Lai, Zahir Tari, Peter Bertók. 35-42 [doi]
- A handover management scheme for mobile IPv6 networksA. K. M. Mahtab Hossain, Kanchana Kanchanasut. 43-48 [doi]
- A modified random way-point model equalized for the node crowding effectAhamed Khan Mohammed. 49-54 [doi]
- A scalable scheduling algorithm to avoid conflicts in switch-memory-switch routersYang Xu, Beibei Wu, Wenjie Li, Bin Liu. 57-64 [doi]
- Computing delay constrained paths from one source to single/all destinationsGang Feng. 65-70 [doi]
- A simple method for balancing network utilization and quality of routingYuxi Li, Janelle J. Harms, Robert Holte. 71-76 [doi]
- Efficient forwarding of symbolically addressed geocast messagesFrank Dürr, Christian Becker, Kurt Rothermel. 77-83 [doi]
- A lightweight classification algorithm for energy conservation in wireless sensor networksNurcan Tezcan, Wenye Wang. 87-92 [doi]
- Low-energy sensor network time synchronization as an emergent propertyStephen F. Bush. 93-98 [doi]
- ArDeZ: a low power asymmetric rendezvous MAC for sensor networksKwan-Wu Chin, Raad Raad. 99-104 [doi]
- A novel IEEE 802.15.3 CTA sharing protocol for supporting VBR streamsKwan-Wu Chin, Darryn Lowe. 107-112 [doi]
- FairMAC: fair sharing of multi-access channels in WLAN hotspotsPrasun Sinha, Yuval Shavitt, Ramachandran Ramjee, Danny Raz, Sneha Kumar Kasera. 113-118 [doi]
- Smart PSK provisioning: a key-management and authentication scheme for wireless LANsDario S. Tonesi, Luca Salgarelli. 119-124 [doi]
- Resource management and QoS control in multiple traffic wireless and mobile Internet systemsYong Xu, Huazhou Liu, Qing-An Zeng. 125-130 [doi]
- Constructing minimum cost dynamic multicast trees under delay constraintMin Yang, Yingchun Yang. 133-138 [doi]
- Heterogeneous QoS multicast in Diffserv-like networksSai-Sudhir Anantha-Padmanaban, Govindarasu Manimaran, Prasant Mohapatra. 139-144 [doi]
- TCP-XM: unicast-enabled reliable multicastKarl Jeacle, Jon Crowcroft. 145-150 [doi]
- Maximizing open capacity in mobile optical backbone networks using controllable mobile agentsFangting Sun, Abhishek Kashyap, Mark A. Shayman. 153-158 [doi]
- Efficient on-demand topology control for wireless ad hoc networksYu Wang 0003, Xinghua Shi. 159-164 [doi]
- A scalable mutual exclusion algorithm for mobile ad hoc networksWeigang Wu, Jiannong Cao, Jin Yang. 165-170 [doi]
- Scalable IP-VPN flow control mechanism supporting arbitrary fairness criteria. Part 1. Architecture designOsamu Honda, Hiroyuki Ohsaki, Makoto Imase, Junichi Murayama, Kazuhiro Matsuda. 173-178 [doi]
- CA-RTO: a contention-adaptive retransmission timeoutIoannis Psaras, Vassilis Tsaoussidis, Lefteris Mamatas. 179-184 [doi]
- Achieving maximum throughput with a minimum number of label switched paths in MPLS networksHua Wang, Jianyu Lou, Yu Chen, Ya-Min Sun, Xiaojun Shen. 187-192 [doi]
- A dual round-robin algorithm for combined input-crosspoint-queued switchesYanfeng Zheng, Wen Gao. 193-198 [doi]
- On fair scheduling in heterogeneous link aggregated servicesSatya Ranjan Mohanty, Laxmi N. Bhuyan. 199-205 [doi]
- The next big bang in wireless and mobile communicationSandra R. Thuel, Rene L. Cruz. 208 [doi]
- Security and IP-based 3G wireless networksThomas F. La Porta. 211 [doi]
- An anchor-based routing protocol with cell ID management system for ad hoc networksHuaizhi Li, Mukesh Singhal. 215-222 [doi]
- A priority forwarding technique for efficient and fast flooding in wireless ad hoc networksKihwan Kim, Ying Cai, Wallapak Tavanapong. 223-228 [doi]
- Energy-aware connected dominating set construction in mobile ad hoc networksBonam Kim, Junmo Yang, Dong Zhou, Min-Te Sun. 229-234 [doi]
- Grid based two transmission range strategy for MANETsZhijun Wang, Jingyuan Zhang. 235-240 [doi]
- Dynamic reconfiguration for optical networkSaurabh Bhandari, E. K. Park. 243-248 [doi]
- Sparsely hubbed light-trail grooming networksSrivatsan Balasubramanian, Arun K. Somani, Ahmed E. Kamal. 249-254 [doi]
- On-line multicast routing in WDM grooming networksArun Vishwanath, Weifa Liang. 255-260 [doi]
- Detecting denial-of-service attacks with incomplete audit dataAnimesh Patcha, Jung-Min Park 0001. 263-268 [doi]
- On the impact of DoS attacks on Internet traffic characteristics and QoSPhilippe Owezarski. 269-274 [doi]
- Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sourcesRuiliang Chen, Jung-Min Park 0001. 275-280 [doi]
- On the effect of router buffer sizes on low-rate denial of service attacksSandeep Sarat, Andreas Terzis. 281-286 [doi]
- Packet delay estimation for ad hoc networksHeberto del Rio, Dilip Sarkar, Luisa D. Stelling. 289-296 [doi]
- Analysis of TCP throughput in IEEE 802.11 based multi-hop ad hoc networksXia Li, Peng Yong Kong, Kee Chaing Chua. 297-302 [doi]
- Impact of lossy links on performance of multihop wireless networksYuxi Li, Janelle J. Harms, Robert Holte. 303-308 [doi]
- Least-cost disjoint paths with dependent cost structure in wavelength continuous optical WDM networksAjay Kumar Todimala, Byrav Ramamurthy. 311-316 [doi]
- Traffic engineering for virtual private networks and random traffic demands in WDM optical core networksElias A. Doumith, Maurice Gagnaire, Olivier Audouin, Nicolas Puech. 317-322 [doi]
- Reducing restoration blocking in WDM optical networksZhi Liu, Lu Ruan. 323-330 [doi]
- A secure cookie protocolAlex X. Liu, Jason M. Kovacs, Chin-Tser Huang, Mohamed G. Gouda. 333-338 [doi]
- Stochastic behavior of random constant scanning wormsKurt Rohloff, Tamer Basar. 339-344 [doi]
- A balanced key tree approach for dynamic secure group communicationGeng Hao, N. V. Vinodchandran, Byrav Ramamurthy, Xukai Zou. 345-350 [doi]
- Bandwidth reservation and QoS in Internet MANETsNirmala Shenoy, Yin Pan, Vishal Gogula Reddy. 353-358 [doi]
- Self-certified group key generation for ad hoc clusters in wireless sensor networksOrtal Arazi, Hairong Qi. 359-364 [doi]
- An integrated and flexible approach to robust and secure routing for wireless multihop ad-hoc networksRachna Guru, Geoff Huang, Katia Obraczka. 365-372 [doi]
- Offset distortion traces for trace-based evaluation of video quality after network transportPatrick Seeling, Martin Reisslein, Frank H. P. Fitzek. 375-380 [doi]
- Improving H.264 video transmission in 802.11e EDCAAdlen Ksentini, Abdelhak Guéroui, Mohamed Naimi. 381-386 [doi]
- Performance studies of networked video-on-demand systemsVrinda Tokekar, Ashwani Kumar Ramani, Sanjiv Tokekar. 387-392 [doi]
- A peer-to-peer overlay for context information searchTao Gu, Hung Keng Pung, Daqing Zhang. 395-400 [doi]
- Synergy: an overlay internetworking architectureMinseok Kwon, Sonia Fahmy. 401-406 [doi]
- Deployable overlay network for defense against distributed SYN flood attacksYuichi Ohsita, Shingo Ata, Masayuki Murata. 407-412 [doi]
- Packetization of 3D progressive meshes for streaming over lossy networksYan Gu, Wei Tsang Ooi. 415-420 [doi]
- Reducing the user perceived delay of interactive TCP connections using a dynamic priority approachPeter Dimopoulos, Panlop Zeephongsekul, Zahir Tari. 421-427 [doi]
- A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networksSimon G. M. Koo, C. S. Geroge Lee, Karthik Kannan. 428-433 [doi]
- A bandwidth allocation framework for adaptive multimedia traffic with flexible time adaptability in wireless and mobile networksPritam Chanda, Qing-An Zeng. 437-442 [doi]
- Statistical analysis of the impact of routing in MANETs based on real-time measurementsAvesh Kumar Agarwal, Wenye Wang. 443-448 [doi]
- STCP: a generic transport layer protocol for wireless sensor networksYogesh G. Iyer, Shashidhar Gandham, Subbarayan Venkatesan. 449-454 [doi]
- A new low-delay matching algorithm for input-queued switchesMadhusudan Hosaagrahara, Harish Sethu. 457-462 [doi]
- On the limitation of fluid-based approach for Internet congestion controlDo Young Eun. 463-468 [doi]
- Distributed out-bound load balancing in Inter-AS routing by random matchingsRavi Musunuri, Jorge Arturo Cobb. 469-475 [doi]
- Roaming, hand-off and services continuity for voice services in converged wireless networksGiridhar D. Mandyam. 478 [doi]
- Future of wireless networksGeorge E. Rittenhouse. 480 [doi]
- Sub-network mobility analysis in wireless sensor networksNoseong Park, Daeyoung Kim 0001, JiHoon Park, Yoonmee Doh. 483-488 [doi]
- Search-based physical attacks in sensor networksXun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu, Dong Xuan. 489-496 [doi]
- Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readersJoongheon Kim, Wonjun Lee, Jieun Yu, Jihoon Myung, Eunkyo Kim, Choonhwa Lee. 497-502 [doi]
- Scheduling on sensor hybrid networkHongsik Choi, Ju Wang, Esther A. Hughes. 503-508 [doi]
- V2 over IP: telecom service application and operational architecture to support video and voiceWei Liu, Ek Park. 511-516 [doi]
- Efficient, scalable migration of IP telephony calls for enhanced fault-toleranceManish Marwah, David Chavez, Don Gillespie, Vivek Velamala. 517-522 [doi]
- A VoIP emergency services architecture and prototypeMatthew Mintz-Habib, Anshuman Singh Rawat, Henning Schulzrinne, Xiaotao Wu. 523-528 [doi]
- Network simulation via hybrid system modeling: a time-stepped approachAmogh Kavimandan, Wonsuck Lee, Marina Thottan, Aniruddha S. Gokhale, Ramesh Viswanathan. 531-536 [doi]
- Active and passive measurements on campus, regional and national network backbone pathsPrasad Calyam, Dima Krymskiy, Mukundan Sridharan, Paul Schopis. 537-542 [doi]
- The impact of multi-homing on network reliability and stability: a case studyHyo-Jeong Shin, Dan Pei, Mohit Lad, Yanghee Choi, Lixia Zhang 0001. 543-548 [doi]
- Dynamic shared Layer 1 VPN provisioning in next-generation SONET/SDH networksNasir Ghani, Driss Benhaddou, Wesam Alanqar, Krishna Amimireddygari, Satish Dandu. 549-554 [doi]
- Directed position estimation: a recursive localization approach for wireless sensor networksHoracio A. B. F. de Oliveira, Eduardo Freire Nakamura, Antonio Alfredo Ferreira Loureiro, Azzedine Boukerche. 557-562 [doi]
- Detection and tracking of region-based evolving targets in sensor networksChunyu Jiang, Guozhu Dong, Bin Wang. 563-568 [doi]
- A localization algorithm with learning-based distancesDuyBach Bui, Daeyoung Kim. 569-574 [doi]
- Streaming over subscription overlay networksYing Cai, Jianming Zhou. 577-582 [doi]
- Efficient data retrieving in distributed data-streaming environmentsYunhao Liu, Jun Miao, Lionel M. Ni, Jinsong Han. 583-588 [doi]
- Improvement research on transmission mechanism of adaptive forward error correction codeYing Xiong, Yu Zhang, Xinyu Jin. 591 [doi]
- A simulation study on the performance evaluation of UMTS with multi-serviceLing Luo, Jianjun Yang, Kangsheng Chen. 592-593 [doi]
- Bounds on throughput capacity of MANETsOualid Chaker, Jean Conan. 593 [doi]
- Adaptable video streaming over wireless networksDmitri Jarnikov, Johan Lukkien, Peter van der Stok. 594 [doi]
- Web services management and selection: applied performance mechanismsRuth Lennon, John Murphy. 595 [doi]
- Real-time video over wireless ad-hoc networksJohannes Karlsson, Haibo Li, Jerry Eriksson. 596 [doi]
- A best first search based optimal wavelength assignment algorithm to minimize the number of SONET ADMs in WDM ringsSethuraman Janardhanan, Ambuj Mahanti, Debashis Saha, Samir K. Sadhukhan. 597 [doi]
- Mobile multicast routing for broadband communication servicesShoji Yoshimura, Hajime Ueno, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami. 598 [doi]