Abstract is missing.
- Copyright [doi]
- Committees [doi]
- Message from the Technical Committee Co-chairs [doi]
- External Reviewers [doi]
- Message from the General Co-chairs [doi]
- Title Page [doi]
- Expected Convergence Properties of BGPRamesh Viswanathan, Krishan K. Sabnani, Robert J. Holt, Arun N. Netravali. 3-15 [doi]
- Stable Egress Route Selection for Interdomain Traffic Engineering: Model and AnalysisHao Wang, Haiyong Xie 0002, Yang Richard Yang, Avi Silberschatz, Erran L. Li, Yanbin Liu. 16-29 [doi]
- On Understanding of Transient Interdomain Routing FailuresFeng Wang, Lixin Gao, Jia Wang, Jian Qiu. 30-39 [doi]
- On the Stability of Rational, Heterogeneous Interdomain Route SelectionHao Wang, Haiyong Xie 0002, Yang Richard Yang, Avi Silberschatz, Erran L. Li, Yanbin Liu. 40-52 [doi]
- Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network ExperimentSandip Bapat, Vinodkrishnan Kulathumani, Anish Arora. 53-62 [doi]
- Tracking Targets with Quality inWireless Sensor NetworksGuanghui He, Jennifer C. Hou. 63-74 [doi]
- The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc NetworksYan Gao, Dah-Ming Chiu, John C. S. Lui. 75-84 [doi]
- Routing in Ad-hoc Networks with MIMO LinksKarthikeyan Sundaresan, Raghupathy Sivakumar. 85-98 [doi]
- MuON: Epidemic Based Mutual AnonymityNeelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo. 99-109 [doi]
- Incentives to Promote Availability in Peer-to-Peer Anonymity SystemsDaniel R. Figueiredo, Jonathan K. Shapiro, Donald F. Towsley. 110-121 [doi]
- Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer NetworksHongbo Jiang, Shudong Jin. 122-131 [doi]
- Z-Ring: Fast Prefix Routing via a Low Maintenance Membership ProtocolQiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, Ben Y. Zhao. 132-146 [doi]
- Path Vector Face Routing: Geographic Routing with Local Face InformationBen Leong, Sayan Mitra, Barbara Liskov. 147-158 [doi]
- Simple Robotic Routing in Ad Hoc NetworksDaejoong Kim, Nicholas F. Maxemchuk. 159-168 [doi]
- Landmark Guided ForwardingMenghow Lim, Adam Chesterfield, Jon Crowcroft, Julian Chesterfield. 169-178 [doi]
- Efficient Hop ID based Routing for Sparse Ad Hoc NetworksYao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu. 179-190 [doi]
- Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite EventsWeifeng Chen, James F. Kurose, Donald F. Towsley, Zihui Ge. 191-200 [doi]
- Can coexisting overlays inadvertently step on each other?Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone. 201-214 [doi]
- Optimal Routing with Multiple Traffic Matrices Tradeoff between Average andWorst Case PerformanceChun Zhang, James F. Kurose, Donald F. Towsley, Zihui Ge, Yong Liu. 215-224 [doi]
- Does Over-Provisioning Become More or Less Efficient as Networks Grow Larger?Yaqing Huang, Roch Guérin. 225-235 [doi]
- Measuring the Shared Fate of IGP Engineering and Interdomain TrafficSharad Agarwal, Antonio Nucci, Supratik Bhattacharyya. 236-245 [doi]
- Robust Multiclass Signaling Overload ControlSneha Kumar Kasera, José Pinheiro, Catherine Loader, Tom LaPorta, Mehmet Karaul, Adiseshu Hari. 246-258 [doi]
- Modeling and Verification of IPSec and VPN Security PoliciesHazem H. Hamed, Ehab S. Al-Shaer, Will Marrero. 259-278 [doi]
- Efficient Node Admission for Short-lived Mobile Ad Hoc NetworksNitesh Saxena, Gene Tsudik, Jeong Hyun Yi. 269-278 [doi]
- A Family of Collusion Resistant Protocols for Instantiating SecuritySandeep S. Kulkarni, Bezawada Bruhadeshwar. 279-288 [doi]
- Typed Abstraction of Complex Network CompositionsAzer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibrahim Matta. 289-300 [doi]
- TCP Connection Game: A Study on the Selfish Behavior of TCP UsersHonggang Zhang, Donald F. Towsley, Weibo Gong. 301-310 [doi]
- Priority Pricing in Utility Fair NetworksTobias Harks, Tobias Poschwatta. 311-320 [doi]
- Trading Precision for Stability in Congestion Control with Probabilistic Packet MarkingJonathan K. Shapiro, C. V. Hollot, Donald F. Towsley. 321-331 [doi]
- CONNET: Self-Controlled Access Links for Delay and Jitter RequirementsMohamed A. El-Gendy, Kang G. Shin, Hosam Fathy. 332-344 [doi]
- On Static and Dynamic Partitioning Behavior of Large-Scale NetworksDerek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov. 345-357 [doi]
- Shape Shifting Tries for Faster IP Route LookupHaoyu Song, Jonathan S. Turner, John W. Lockwood. 358-367 [doi]
- Efficient Probabilistic Packet MarkingQunfeng Dong, Suman Banerjee, Micah Adler, Kazu Hirata. 368-377 [doi]
- Intersection Characteristics of End-to-End Internet Paths and TreesSevcan Bilir, Kamil Saraç, Turgay Korkmaz. 378-390 [doi]
- Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless CommunicationYu Dong, David K. Y. Yau. 391-400 [doi]
- Stability and Sensitivity for Congestion Control in Wireless Networks with Time Varying Link CapacitiesGuohua Zhang, Yiyu Wu, Yonghe Liu. 401-412 [doi]