3225 | -- | 3241 | Christos Xenakis, Nikolaos Laoutaris, Lazaros F. Merakos, Ioannis Stavrakakis. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms |
3242 | -- | 3263 | Corinne Touati, Eitan Altman, Jérôme Galtier. Generalized Nash Bargaining Solution for bandwidth allocation |
3264 | -- | 3283 | Celeste Campo, Carlos García-Rubio, Andrés Marín López, Florina Almenárez Mendoza. PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks |
3284 | -- | 3299 | Daniel Bauer, John N. Daigle, Ilias Iliadis, Paolo Scotton. Topology aggregation for combined additive and restrictive metrics |
3300 | -- | 3314 | Gang Cheng, Nirwan Ansari. Rate-distortion based link state update |
3315 | -- | 3333 | Li Xiao, Guanghui He, Klara Nahrstedt. BGP session lifetime modeling in congested networks |
3334 | -- | 3352 | Yu Ge, Winston Khoon Guan Seah. A method to efficiently integrate Internet Telephony call signaling with dynamic resource negotiation |
3353 | -- | 3374 | Nicolas Christin, Jörg Liebeherr. The QoSbox: Quantitative service differentiation in BSD routers |
3375 | -- | 3399 | Inn Inn Er, Winston Khoon Guan Seah. Performance analysis of mobility-based ::::d::::-hop (MobDHop) clustering algorithm for mobile ad hoc networks |
3400 | -- | 3415 | Shi Xiao, Gaoxi Xiao, Yiu-Wing Leung. A network flow approach for static and dynamic traffic grooming in WDM networks |
3416 | -- | 3433 | Xiaoming Fu, Hannes Tschofenig, Dieter Hogrefe. Beyond QoS signaling: A new generic IP signaling framework |
3434 | -- | 3448 | Jongkeun Na, Chong-kwon Kim. GLR: A novel geographic routing scheme for large wireless ad hoc networks |
3449 | -- | 3465 | Yaoyao Gu, Doruk Bozdag, Robert W. Brewer, Eylem Ekici. Data harvesting with mobile elements in wireless sensor networks |
3466 | -- | 3484 | Tuna Tugcu, H. Birkan Yilmaz, Feodor S. Vainstein. Analytical modeling of CAC in next generation wireless systems |
3485 | -- | 3521 | John Risson, Tim Moors. Survey of research towards robust peer-to-peer networks: Search methods |