Abstract is missing.
- Message from the General ChairLinda F. Wilson. [doi]
- Panel II: PKI to the massesPartha Dasgupta. [doi]
- Panel I: Wireless networking: interoperability and security challengesArjan Durresi. [doi]
- Message from the Program Co-ChairsHossam S. Hassanein, Golden G. Richard III. [doi]
- Improving server broadcast efficiency through better utilization of client receiving bandwidthAshwin Natarajan, Ying Cai, Johnny Wong. 5-12 [doi]
- A buffer management scheme for tree-based reliable multicast using infrequent acknowledgmentsJinsuk Baek, Jehan-François Pâris. 13-20 [doi]
- Selection algorithms for anycast relay routingJianping Zheng, Keqin Li, Zhimei Wu. 21-27 [doi]
- Aggressive telecommunications overbooking ratiosRobert Ball, Mark J. Clement, Feng Huang, Quinn Snell, Casey T. Deccio. 31-38 [doi]
- Settlement and capacity planning in multi-service provider infrastructuresLisa Amini, Giuseppe A. Paleologo, Olivier Verscheure. 39-48 [doi]
- Algebraic geometric code based IP tracebackChunyan Bai, Gui Liang Feng, Gesan Wang. 49-56 [doi]
- Connection-level performance analysis for adaptive bandwidth allocation in multimedia wireless cellular networksNidal Nasser, Hossam S. Hassanein. 61-68 [doi]
- Adaptive channel switching for admission control with QoS and priority in WCDMA uplinkBing Cao, Teresa A. Dahlberg. 69-76 [doi]
- A novel velocity-dependent directional probability function based call admission control scheme in wireless multimedia communicationsMohammad Mahfuzul Islam, Manzur Murshed, Laurence S. Dooley. 77-83 [doi]
- Toward efficient distributed network monitoringXiaojiang Du. 87-94 [doi]
- Admission control in deadline-based network resource managementYanni Ellen Liu, Johnny W. Wong. 95-102 [doi]
- On the performance of Maestro2 high performance network equipment, using new improvement techniquesShinichi Yamagiwa, Kevin Ferreira, Luis Miguel Campos, Keiichi Aoki, Masaaki Ono, Koichi Wada, Munehiro Fukuda, Leonel Sousa. 103-110 [doi]
- Survivable multipath routing using link penalizationDong-won Shin, Edwin K. P. Chong, Howard Jay Siegel. 115-122 [doi]
- Benchmarks for IP forwarding tablesManohar R. Castelino, Ravi Gunturi, Valerio Filauro, George Vlantis, Michel Campmas, Alan Coppola. 123-130 [doi]
- Damping BGP route flapsZhenhai Duan, Jaideep Chandrashekar, Jeffrey Krasky, Kuai Xu, Zhi-Li Zhang. 131-138 [doi]
- Channel state dependent robust TCP/IP header compression for 3G wireless networksYichuan Wu, Limin Sun, Jianping Zheng, Kui Huang, Yong Liao. 141-145 [doi]
- Interplay of service differentiation and routing mechanisms in MANETs: a performance studyK. N. Sridhar, Lillykutty Jacob. 147-151 [doi]
- Framework for performance analysis of channel-aware wireless schedulersRaphael Rom, Hwee Pink Tan. 153-157 [doi]
- An efficient method for computing the bit error probabilities of band-limited asynchronous DS-CDMA systems with random signature sequencesJen-Shiun Chen. 159-163 [doi]
- Predicting node location in a PCS networkWilliam Navidi, Tracy Camp. 165-170 [doi]
- A cluster based secure routing scheme for wireless ad hoc networksRajani Poosarla, Hongmei Deng, Alok Ojha, Dharma P. Agrawal. 171-175 [doi]
- CGRED: class guided random early discardingYuchun Guo, Yongxiang Zhao, Guangnong Song, Xinyu Xing, Changjia Chen. 179-185 [doi]
- Capacity provisioning in DiffServ/MPLS networks based on correlated traffic inputsIrena Atov, Richard J. Harris. 187-193 [doi]
- SONAR: a platform for flexible DiffServ/MPLS traffic engineeringSteven Van den Berghe, Filip De Turck, Piet Demeester. 195-201 [doi]
- Available bandwidth measurement using Poisson probing on the InternetXiaojun Hei, Danny H. K. Tsang, Brahim Bensaou. 207-214 [doi]
- Optimization of the bandwidth distribution scheme for handling topology changesVasil Hnatyshin, Adarshpal S. Sethi. 215-222 [doi]
- Statistical bounds on the drop probability of assured forwarding services in DiffServ interior nodes under the processor sharing scheduling disciplineBrahim Bensaou, Shixin Zhuang, Xiren Cao. 223-230 [doi]
- Compositional layered performance modeling of peer-to-peer routing softwarePengfei Wu, C. Murray Woodside, Chung-Horng Lung. 231-238 [doi]
- A performance analysis of the sockets direct protocol (SDP) with asynchronous I/O over 4X InfiniBandAriel Cohen 0003. 241-246 [doi]
- Analysis and improvements to MATE algorithmMiguel Griot, Gabriel Tucci, Pablo Belzarena, Santiago Remersaro. 247-251 [doi]
- Probabilistic packet delay guarantee in buffered crossbar switchQiang Duan, John N. Daigle. 253-258 [doi]
- A game theory based approach for security in wireless sensor networksAfrand Agah, Sajal K. Das, Kalyan Basu. 259-263 [doi]
- A simulation study on a layered video multicast algorithmNaveen K. Chilamkurti, Ben Soh. 265-269 [doi]
- A fast pattern matching algorithm for network processor-based intrusion detection systemRong-Tai Liu, Nen-Fu Huang, Chia-Nan Kao, Chih-Hao Chen. 271-275 [doi]
- Using adaptive priority scheduling for service differentiation QoS-aware Web serversMário Meireles Teixeira, Marcos José Santana, Regina H. C. Santana. 279-285 [doi]
- End-to-end layered multicast of streaming media in heterogeneous networksChandana Nagaraj, Maggie Nguyen, Layla Pezeshkmehr, Melody Moh. 287-292 [doi]
- Differentiated caching of dynamic content using effective page classificationWenzhong Chen, Patrick Martin, Hossam S. Hassanein. 293-298 [doi]
- Differentiated-service enabled group communications using bandwidth brokersMeetali Goel, Melody Moh, Toru Hasegawa, Shigehiro Ano. 299-304 [doi]
- On the reliability of ODMRP in mobile ad hoc networksAhmed Sobeih, Hoda Baraka, Aly Fahmy. 307-308 [doi]
- An adaptive algorithm for estimating wireless communication channelRenbin Peng, Dazheng Feng, Lijun Jin. 309-310 [doi]
- A goal-oriented self-tuning caching algorithmGanesh Santhanakrishnan, Ahmed Amer, Panos K. Chrysanthis. 311-312 [doi]
- Coopeer: a peer-to-peer Web search engine towards collaboration, humanization and personalizationJin Zhou, Kai Li, Li Tang. 313-314 [doi]
- Queueing analysis of DCHF and token-passing protocols with varying turnaround timeManikanden Balakrishnan, Eric E. Johnson. 315-316 [doi]
- Secure multimedia transmission in IPv6 wireless networksHaeyong Kim, Yongho Seok, Yanghee Choi. 317-318 [doi]
- A public key algorithm for ad-hoc networksBogdan Carbunar, Ananth Grama, Jan Vitek. 319-320 [doi]
- Performance analysis of multi-hop wireless ad hoc networks using IEEE 802.11 DCFYue Fang, A. Bruce McDonald. 321-322 [doi]
- Adaptive gossip-based routing algorithmZhongmin Shi, Hong Shen. 323-324 [doi]
- Stability helps quality of service routing in wireless ad hoc networksJamal N. Al-Karaki, Ahmed E. Kamal. 329-336 [doi]
- An information dissemination protocol for an ad hoc networkXia Jiang, Tracy Camp. 337-345 [doi]
- Position-based routing with a power-aware weighted forwarding function in MANETsJinhui Shen, Janelle J. Harms. 347-355 [doi]
- Flexible mechanisms for performance enhancements of cluster networksNader Mohamed, Jameela Al-Jaroodi, Hong Jiang. 359-366 [doi]
- A distributed coordinated approach to parallel programmingChia-Chu Chiang. 367-374 [doi]
- Object allocation and memory contention study of Java multithreaded applicationsWei Huang, Yang Qian, Witawas Srisa-an, J. Morris Chang. 375-382 [doi]
- Comparative analysis of algorithms for tree structure restoration in sensor networksFan Bai, Ahmed Helmy. 385-391 [doi]
- A new protocol for a low power sensor networkMario Neugebauer, Klaus Kabitzsch. 393-399 [doi]
- Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networksAbdulrahman H. Altalhi, Golden G. Richard III. 407-413 [doi]
- SEKEN: secure and efficient key exchange for sensor networksKamran Jamshaid, Loren Schwiebert. 415-422 [doi]
- Adaptive location aided mobile ad hoc network routingJeff Boleng, Tracy Camp. 423-432 [doi]
- Performance implications of different adaptation mechanisms for network content deliveryXiaodong Fu, Vijay Karamcheti. 435-444 [doi]
- Meta algorithms for hierarchical Web cachesNikolaos Laoutaris, Sofia Syntila, Ioannis Stavrakakis. 445-452 [doi]
- QoS differentiation in switching-based Web cachingJian Zhou, Patrick Martin, Hossam S. Hassanein. 453-460 [doi]
- Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networksSapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy. 463-469 [doi]
- Relocation of gateway for enhanced timeliness in wireless sensor networksKemal Akkaya, Mohamed Younis. 471-476 [doi]
- Energy-efficient broadcast-based event update disseminationÖmer Erdem Demir, Demet Aksoy. 477-482 [doi]
- A robust PI controller for improving performance in the AF-based differentiated services networkXiaolin Chang, Jogesh K. Muppala. 487-494 [doi]
- EPCF: a lightweight multi-priority PCF for QoS support in IEEE 802.11 wireless LANsJamal N. Al-Karaki, J. Morris Chang. 495-502 [doi]
- QoS service routing in one-to-one and one-to-many scenarios in next-generation service-oriented networksJingwen Jin, Klara Nahrstedt. 503-510 [doi]
- Improving file transfers using SCTP multistreamingSourabh Ladha, Paul D. Amer. 513-522 [doi]
- IPCC-SCTP: an enhancement to the standard SCTP to support multi-homing efficientlyGuanhua Ye, Tarek N. Saadawi, Myung J. Lee. 523-530 [doi]
- Active queue management for Web trafficMark Claypool, Robert E. Kinicki, Matthew Hartling. 531-538 [doi]
- On CAC, DCA, and scheduling in TDD multi-hop 4G wireless networksAhmed M. Safwat. 541-546 [doi]
- Performance analysis of ARQ schemes for UTRA TDD ad hoc modeMaría Dolores Pérez Guirao, Jose-Esteban Garcia, Michael Meincke, Matthias Lott, Klaus Jobmann. 547-552 [doi]
- Dynamic rate-selection for extending the lifetime of energy-constrained networksNevine AbouGhazaleh, Patrick E. Lanigan, Sameh Gobriel, Daniel Mossé, Rami G. Melhem. 553-558 [doi]
- On carrier-sense integration in learning automata-based MAC protocols for ad-hoc wireless LANsPetros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis. 565-569 [doi]
- A QoS-aware MAC layer protocol for wireless LANsNoun Choi, Subbarayan Venkatesan, Ravi Prakash. 571-577 [doi]
- A directional antennas-based dual mode MAC protocol for ad hoc networksMasanori Takata, Katsushiro Nagashima, Takashi Watanabe. 579-584 [doi]
- Max-min fair collision-free scheduling for wireless sensor networksAvinash Sridharan, Bhaskar Krishnamachari. 585-590 [doi]
- An analysis on selective dropping attack in BGPKe Zhang, Xiaoliang Zhao, Shyhtsun Felix Wu. 593-599 [doi]
- VisFlowConnect: providing security situational awareness by visualizing network traffic flowsXiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, Cristina Abad. 601-607 [doi]
- Experimental analysis of attacks against routing network infrastructuresAntonio Pescapè, Giorgio Ventre. 609-615 [doi]
- Position-based QoS routing in mobile ad hoc networks: problem statement and a novel approachFazli Erbas, Jose-Esteban Garcia, Klaus Jobmann. 619-623 [doi]
- A location information-based route discovery protocol for mobile ad hoc networksHabib M. Ammari, Hesham El-Rewini. 625-630 [doi]
- CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networksMohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy. 631-636 [doi]
- A dynamic multicast tree reconstruction algorithm for minimum-energy multicasting in wireless ad hoc networksSong Guo, Oliver Yang. 637-642 [doi]
- Robust tree-based multicasting in ad hoc networksRavindra Vaishampayan, J. J. Garcia-Luna-Aceves. 647-652 [doi]
- Mobile ad hoc multicasting to support distributed virtual environmentsChatchai Khunboa, Robert Simon. 653-659 [doi]
- PARIX: a protocol adaptive mechanism for routing information exchange across heterogeneous ad hoc routing domainsPoornananda R. Gaddehosur, A. S. Tulasi. 661-665 [doi]
- Architecting information assuranceJulie J. C. H. Ryan. 669-673 [doi]
- How to predict e-mail viruses under uncertaintyInSeon Yoo, Ulrich Ultes-Nitsche. 675-679 [doi]
- Flow policies: specification and enforcementElisa Bertino, Elena Ferrari, Giovanni Mella. 681-684 [doi]
- An energy-efficient MAC layer scheme for 802.11-based WLANsValeria Baiamonte, Carla-Fabiana Chiasserini. 689-694 [doi]
- Reducing overhearing energy in 802.11 networks by low-power interface idlingSubir K. Biswas, Samir Datta. 695-700 [doi]
- Performance evaluation of the IEEE 802.15.4 MAC for low-rate low-power wireless networksGang Lu, Bhaskar Krishnamachari, Cauligi S. Raghavendra. 701-706 [doi]
- Analysis and optimization of energy efficiency in 802.11 distributed coordination functionXiaodong Wang, Dharma P. Agrawal. 707-712 [doi]
- Application-specific modelling of information routing in wireless sensor networksBhaskar Krishnamachari, John S. Heidemann. 717-722 [doi]
- Reducing localization errors in sensor ad hoc networksDmitri Perkins, Ramesh Tumati. 723-729 [doi]
- An adaptive low power reservation based MAC protocol for wireless sensor networksSaurabh Mishra, Asis Nasipuri. 731-736 [doi]
- The interaction of security and survivability in hybrid wireless networksPrashant V. Krishnamurthy, David Tipper, Yi Qian. 739-745 [doi]
- On intrusion detection and response for mobile ad hoc networksJames Parker, Jeffrey Undercoffer, John Pinkston, Anupam Joshi. 747-752 [doi]
- SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applicationsWassim Itani, Ayman I. Kayssi. 753-759 [doi]
- On the performance of reflective systems softwareGeoff Coulson, Gordon S. Blair, Paul Grace. 763-769 [doi]
- Regression benchmarking with simple middleware benchmarksLubomír Bulej, Tomas Kalibera, Petr Tuma. 771-776 [doi]
- Performance consequences of inconsistent client-side membership information in the open group modelHein Meling, Bjarne E. Helvik. 777-782 [doi]
- On the generalised stochastic Petri net modeling of message-oriented middleware systemsStenio F. L. Fernandes, Wellington João Silva, Mauro Jose Carlos e Silva, Nelson S. Rosa, Paulo Romero Martins Maciel, Djamel Fawzi Hadj Sadok. 783-788 [doi]
- Cost-aware downlink scheduling of shared channels for cellular networks with relaysNarasimha Challa, Hasan Çam. 793-798 [doi]
- Free trade for hybrid multihop wireless networksJohn Mitsianis. 799-805 [doi]
- Low delay marking for TCP in wireless ad hoc networksChoong Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert E. Kinicki. 807-812 [doi]
- Lightweight key management for wireless sensor networksMohamed Eltoweissy, Mohamed Younis, Kajaldeep Ghumman. 813-818 [doi]
- Ensuring information assurance in federated identity managementDongwan Shin, Gail-Joon Ahn, Prasad Shenoy. 821-826 [doi]
- A classification of malicious software attacksHanno Langweg, Einar Snekkenes. 827-832 [doi]
- Committal deniable signatures over elliptic curvesSong Han, Wanquan Liu. 833-839 [doi]
- Performance analysis of the Globus Toolkit Monitoring and Discovery Service, MDS2Xuehai Zhang, Jennifer M. Schopf. 843-849 [doi]
- Adaptive power aware remote processing - a step towards power aware middlewareGerald Kaefer, Reinhold Weiss. 851-856 [doi]
- Scale-up and performance studies of three agent platformsKalle Burbeck, Daniel Garpe, Simin Nadjm-Tehrani. 857-863 [doi]
- Performance evaluation of the meta-ORB reflective middleware platformFábio M. Costa. 865-870 [doi]