Abstract is missing.
- XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc NetworkingHervé Aïache, Vania Conan, Laure Lebrun, Jeremie Leguay, Stéphane Rousseau, Damien Thoumin. 1-13 [doi]
- Cross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc NetworksEren Gürses. 14-25 [doi]
- Early Overhearing Avoidance in Wireless Sensor NetworksSiquan Hu, Mehul Motani. 26-35 [doi]
- Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor NetworksAbdelmalik Bachir, Martin Heusse, Andrzej Duda. 36-47 [doi]
- An Overlay Maintenance Protocol for Overlay Routing on Top of Ad Hoc NetworksSandrine Calomme, Guy Leduc. 48-59 [doi]
- An Overlay Architecture for Vehicular NetworksLuigi Liquori, Diego Borsetti, Claudio Casetti, Carla-Fabiana Chiasserini. 60-71 [doi]
- DBR: Depth-Based Routing for Underwater Sensor NetworksHai Yan, Zhijie Jerry Shi, Jun-Hong Cui. 72-86 [doi]
- Channel Allocation for Multiple Channels Multiple Interfaces Communication in Wireless Ad Hoc NetworksTrung-Tuan Luong, Bu-Sung Lee, Chai Kiat Yeo. 87-98 [doi]
- Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State RoutingIgnacy Gawedzki, Khaldoun Al Agha. 99-111 [doi]
- 3-D Localization Schemes of RFID Tags with Static and Mobile ReadersMathieu Bouet, Guy Pujolle. 112-123 [doi]
- Performance Evaluation and Enhancement of Surface Coverage Relay ProtocolAntoine Gallais, Jean Carle. 124-134 [doi]
- On Extending Coverage of UMTS Networks Using an Ad-Hoc Network with Weighted Fair QueueingRachid El Azouzi, Ralph El Khoury, A. Kobbane, E. Sabir. 135-148 [doi]
- A Performance Analysis of Authentication Using Covert Timing ChannelsReed Newman, Raheem A. Beyah. 149-161 [doi]
- PassPattern System (PPS): A Pattern-Based User Authentication SchemeT. Rakesh Kumar, S. V. Raghavan. 162-169 [doi]
- A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic CurvesMeng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee. 170-182 [doi]
- On the Robustness of Complex Networks by Using the Algebraic ConnectivityA. Jamakovic, Piet Van Mieghem. 183-194 [doi]
- On the Social Cost of Distributed Selfish Content ReplicationGerasimos G. Pollatos, Orestis Telelis, Vassilis Zissimopoulos. 195-206 [doi]
- On Performance Evaluation of Handling Streaming Traffic in IP Networks Using TFRC ProtocolKacper Kurowski, Halina Tarasiuk. 207-214 [doi]
- Efficient Heuristic for Minimum Cost Trees Construction in Multi-Groups MulticastKeen-Mun Yong, Gee-Swee Poo, Tee Hiang Cheng. 215-226 [doi]
- Delay Bounds and Scalability for Overlay MulticastGyörgy Dán, Viktória Fodor. 227-239 [doi]
- A Distributed Algorithm for Overlay Backbone Multicast Routing in Content Delivery NetworksJun Guo, Sanjay Jha. 240-251 [doi]
- Network Performance Assessment Using Adaptive Traffic SamplingRené Serral-Gracià, Albert Cabellos-Aparicio, Jordi Domingo-Pascual. 252-263 [doi]
- On the Applicability of Knowledge Based NAT-Traversal for Home NetworksAndreas Müller, Andreas Klenk, Georg Carle. 264-275 [doi]
- IP Performance Management Infrastructure for ISPAtsuo Tachibana, Yuichiro Hei, Tomohiko Ogishi, Shigehiro Ano. 276-288 [doi]
- Can Critical Real-Time Services of Public Infrastructures Run over Ethernet and MPLS Networks?Jaime Lloret, Francisco Javier Sanchez, Hugo Coll, Fernando Boronat. 289-301 [doi]
- Shim6: Reference Implementation and OptimizationJun Bi, Ping Hu, Lizhong Xie. 302-313 [doi]
- A Measurement Study of Bandwidth Estimation in IEEE 802.11g Wireless LANs Using the DCFMichael Bredel, Markus Fidler. 314-325 [doi]
- Hierarchical Logical Topology in WDM Ring Networks with Limited ADMsTomoya Kitani, Nobuo Funabiki, Hirozumi Yamaguchi, Teruo Higashino. 326-337 [doi]
- A Novel Class-Based Protection Algorithm Providing Fast Service Recovery in IP/WDM NetworksWojciech Molisz, Jacek Rak. 338-345 [doi]
- End-to-End Proportional Loss Differentiation in OBS NetworksMiguel A. González-Ortega, José C. López-Ardao, Pablo Jesús Argibay-Losada, Andrés Suárez-González, Cándido López-García, Manuel Fernández-Veiga, Raúl Fernando Rodríguez Rubio. 346-357 [doi]
- The Effect of Peer Selection with Hopcount or Delay Constraint on Peer-to-Peer NetworkingSiyu Tang, Huijuan Wang, Piet Van Mieghem. 358-365 [doi]
- T2MC: A Peer-to-Peer Mismatch Reduction Technique by Traceroute and 2-Means Classification AlgorithmGuangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang. 366-374 [doi]
- Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer NetworksHaiyong Xie 0002, Yang Richard Yang, Avi Silberschatz. 375-384 [doi]
- Cache Placement Optimization in Hierarchical Networks: Analysis and Performance EvaluationWenzhong Li, Edward Chan, Yilin Wang, Daoxu Chen, Sanglu Lu. 385-396 [doi]
- Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality ViolationsMohamed Ali Kâafar, Bamba Gueye, François Cantin, Guy Leduc, Laurent Mathy. 397-408 [doi]
- Efficient Multi-source Data Dissemination in Peer-to-Peer NetworksZhenyu Li, Zengyang Zhu, Gaogang Xie, Zhongcheng Li. 409-420 [doi]
- Modeling Priority-Based Incentive Policies for Peer-Assisted Content Delivery SystemsNiklas Carlsson, Derek L. Eager. 421-432 [doi]
- AQCS: Adaptive Queue-Based Chunk Scheduling for P2P Live StreamingYang Guo, Chao Liang, Yong Liu. 433-444 [doi]
- E2E Blocking Probability of IPTV and P2PTVYue Lu, Fernando A. Kuipers, Milena Janic, Piet Van Mieghem. 445-456 [doi]
- Cooperative Replication in Content Networks with Nodes under ChurnEva Jaho, Ioannis Z. Koukoutsidis, Ioannis Stavrakakis, Ina Jaho. 457-469 [doi]
- Congestion Avoiding Mechanism Based on Inter-domain HierarchyMarc-Antoine Weisser, Joanna Tomasik, Dominique Barth. 470-481 [doi]
- A Novel Bandwidth Broker Architecture Based on Topology Aggregation in Delay|Bandwidth Sensitive NetworksWalid Htira, Olivier Dugeon, Michel Diaz. 482-493 [doi]
- Client-Side Adaptive Search Optimisation for Online Game Server DiscoveryGrenville J. Armitage. 494-505 [doi]
- A Model for Endpoint Admission Control Based on Packet LossIgnacio Más Ivars, Gunnar Karlsson. 506-517 [doi]
- Convergence of Intra-domain Routing with Centralized ControlJing Fu, Peter Sjödin, Gunnar Karlsson. 518-529 [doi]
- Improving the Interaction between Overlay Routing and Traffic EngineeringGene Moo Lee, Taehwan Choi. 530-541 [doi]
- Designing Optimal iBGP Route-Reflection TopologiesMarc-Olivier Buob, Steve Uhlig, Mickael Meulle. 542-553 [doi]
- A Study of Path Protection in Self-Healing RoutingQi Li, Mingwei Xu, Lingtao Pan, Yong Cui. 554-561 [doi]
- The CPBT: A Method for Searching the Prefixes Using Coded Prefixes in B-TreeMohammad Behdadfar, Hossein Saidi. 562-573 [doi]
- On the Effectiveness of Proactive Path-Diversity Based Routing for Robustness to Path FailuresChansook Lim, Stephan Bohacek, João P. Hespanha, Katia Obraczka. 574-585 [doi]
- On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service AttacksThomas Dreibholz, Erwin P. Rathgeb, Xing Zhou. 586-598 [doi]
- DDoS Mitigation in Non-cooperative EnvironmentsGuanhua Yan, Stephan Eidenbenz. 599-611 [doi]
- Generalized Self-healing Key Distribution Using Vector Space Access StructureRatna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel. 612-623 [doi]
- A Model for Covert Botnet Communication in a Private SubnetBrandon Shirley, Chad D. Mano. 624-632 [doi]
- Traffic Engineering and Routing in IP Networks with Centralized ControlJing Fu, Peter Sjödin, Gunnar Karlsson. 633-641 [doi]
- Distributed PLR-Based Backup Path Computation in MPLS NetworksMohand Yazid Saidi, Bernard Cousin, Jean-Louis Le Roux. 642-653 [doi]
- Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network PerformanceNing Wang, Kin-Hon Ho, George Pavlou. 654-666 [doi]
- Modeling TCP in Small-Buffer NetworksMark Shifrin, Isaac Keslassy. 667-678 [doi]
- Active Window Management: Performance Assessment through an Extensive Comparison with XCPMario Barbera, Mario Gerla, Alfio Lombardo, Carla Panarello, M. Y. Sanadidi, Giovanni Schembra. 679-690 [doi]
- AIRA: Additive Increase Rate AcceleratorIoannis Psaras, Vassilis Tsaoussidis. 691-702 [doi]
- Performance Evaluation of Quick-Start TCP with a Linux Kernel ImplementationMichael Scharf, Haiko Strotbek. 703-714 [doi]
- Lightweight Fairness Solutions for XCP and TCP CohabitationDino M. López-Pacheco, Laurent Lefèvre, CongDuc Pham. 715-726 [doi]
- Concurrent Multipath Transfer Using SCTP Multihoming: Introducing the Potentially-Failed Destination StatePreethi Natarajan, Nasif Ekiz, Paul D. Amer, Janardhan R. Iyengar, Randall R. Stewart. 727-734 [doi]
- Energy-Efficient Mobile Middleware for SIP on Ubiquitous Multimedia SystemsFelipe Garcia-Sanchez, Antonio-Javier Garcia-Sanchez, Joan García-Haro. 735-747 [doi]
- A Secure Mechanism for Address Block Allocation and DistributionDamien Leroy, Olivier Bonaventure. 748-755 [doi]
- Asset Localization in Data Centers Using WUSB RadiosNeha Udar, Krishna Kant, R. Viswanathan. 756-767 [doi]
- Improving the Performance of DCH Timing Adjustment in 3G NetworksGaspar Pedreño, Juan J. Alcaraz, Fernando Cerdán, Joan García-Haro. 768-779 [doi]
- Link Adaptation Algorithm for the IEEE 802.11n MIMO SystemWeihua Helen Xi, Alistair Munro, Michael Barton. 780-791 [doi]
- Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden NodesKatarzyna Kosek, Marek Natkaniec, Luca Vollero. 792-803 [doi]
- A Mobility-Adaptive TDMA MAC for Real-Time Data in Wireless NetworksJohannes Lessmann, Dirk Held. 804-811 [doi]
- High Performance Distributed Coordination Function for Wireless LANsHaithem Al-Mefleh, J. Morris Chang. 812-823 [doi]
- Turning Hidden Nodes into Helper Nodes in IEEE 802.11 Wireless LAN NetworksHaithem Al-Mefleh, J. Morris Chang. 824-835 [doi]
- Performance Evaluation of 802.11 Broadcasts for A Single Cell Network With Unsaturated NodesAshwin Rao, Arzad Alam Kherani, Anirban Mahanti. 836-847 [doi]
- Optimal Placement of Mesh Points in Wireless Mesh NetworksSuk Yu Hui, Kai Hau Yeung, Kin Yeung Wong. 848-855 [doi]
- A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial Reuse for Wireless Mesh NetworksYuan-Chieh Lin, Shun-Wen Hsiao, Li-Ping Tung, Yeali S. Sun, Meng Chang Chen. 856-864 [doi]
- A Unified Service Discovery Architecture for Wireless Mesh NetworksMartin Krebs, Karl-Heinz Krempels, Markus Kucay. 865-876 [doi]
- Using Predictive Triggers to Improve Handover Performance in Mixed NetworksHuaiyu Liu, Christian Maciocco, Vijay Kesavan. 877-888 [doi]
- Medium Access Cooperations for Improving VoIP Capacity over Hybrid 802.16/802.11 Cognitive Radio NetworksDeyun Gao, Jianfei Cai, Chuan Heng Foh. 889-900 [doi]
- ERA: Effective Rate Adaptation for WLANsSaad Biaz, Shaoen Wu. 901-913 [doi]
- On the Probability of Finding Non-interfering Paths in Wireless Multihop NetworksSonia Waharte, Raouf Boutaba. 914-921 [doi]
- Multi-commodity Flow Problem for Multi-hop Wireless Networks with Realistic Smart Antenna ModelOsama Bazan, Muhammad Jaseemuddin. 922-929 [doi]
- Evolutionary Power Control Games in Wireless NetworksEitan Altman, Rachid El Azouzi, Yezekael Hayel, Hamidou Tembine. 930-942 [doi]