2 | -- | 4 | CongDuc Pham, Guy Leduc. Foreword |
5 | -- | 20 | Roger Les Cottrell, Saad Ansari, Parakram Khandpur, Ruchi Gupta, Richard Hughes-Jones, Michael Chen, Larry Mcintosh, Frank Leers. Characterization and evaluation of TCP and UDP-based transport on real networks |
21 | -- | 45 | Nageswara S. V. Rao, Qishi Wu, Steven M. Carter, William R. Wing. High-speed dedicated channels and experimental results with Hurricane protocol |
46 | -- | 71 | Xiaoyuan Gu, Pengfei Di, Lars C. Wolf. Performance evaluation of DCCP: A focus on smoothness and TCP-friendliness |
72 | -- | 91 | Fabien Chatté, Bertrand Ducourthial, Silviu-Iulian Niculescu. A study of a simple preventive transport protocol |
92 | -- | 114 | Armando L. Caro Jr., Paul D. Amer, Randall R. Stewart. Rethinking end-to-end failover with transport layer multihoming |
115 | -- | 140 | Chadi Barakat, Mohammad Malli, Naomichi Nonaka. TICP: Transport Information Collection Protocol |
141 | -- | 181 | Alain Abinakhoul, Loutfi Nuaymi. Contrôle de puissance dans les réseaux ad-hoc |
182 | -- | 196 | Valeriu B. Munteanu, Daniela G. Tarniceriu. Transfer functions attached to linear systems with time varying parameters |
197 | -- | 217 | Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García, Sylvain Gombault, Thierry Sans. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework |
218 | -- | 234 | Khaled Labib, V. Rao Vemuri. An application of principal component analysis to the detection and visualization of computer network attacks |