default search action
ICON 2003: Sydney, NSW, Australia
- 11th IEEE International Conference on Networks, ICON 2003, September 28 - October 1, 2003 Sydney, NSW, Australia. IEEE 2003, ISBN 0-7803-7788-5
- Xiaohu Ge
, Guangxi Zhu, Yaoting Zhu:
A new model for network traffic based on alpha-stable self-similar processes. 1-5 - Guoqiang Mao
:
Finite timescale range of interest for self-similar traffic measurements, modelling and performance analysis. 7-12 - Yusheng Ji, Takayuki Fujino, Shunji Abe, Jun Matsukata, Shoichiro Asano:
On the impact of time scales on tail behavior of long-range dependent Internet traffic. 13-18 - K. C. Yong, Z. S. Lai, Akkihebbal L. Ananda:
Integrated network traffic measurement and billing system. 19-24 - Roland Bless, Götz Lichtwald, Markus Schmidt, Martina Zitterbart:
Fast scoped rerouting for BGP. 25-30 - Hassan Gobjuka:
Forwarding-loop-free configuration for IBGP networks. 31-37 - Martin McKenny, Julian A. B. Dines, David Harle:
Transporting multiple classes of traffic over a generic routing device - an investigation into the performance of the RapidIO™ interconnect architecture. 39-44 - Sebastian Zander, Grenville J. Armitage, Clancy Malcolm:
Dynamics and cachability of Web sites: implications for inverted capacity networks. 45-50 - Mehran Dowlatshahi, Glen MacLarty, Michael Fry:
A scalable and efficient architecture for service discovery. 51-56 - Yousef Darmani
, L. White, Michael J. Liebelt:
New methods for lost voice packet recovery in active networks. 57-62 - Doan B. Hoang, Bushar Yousef, Glynn Rogers:
The design of a secure, extensible, and deployable-programmable network platform. 63-68 - David Soen-Mun Chan, Khim Shiong Chua, Christopher Leckie, Ajeet Parhar:
Visualisation of power-law network topologies. 69-74 - Zari Dzalilov, Iradj Ouveysi, Alexander Rubinov:
A lifetime measure for telecommunication network: theoretical aspects. 75-79 - Artur Ziviani, Serge Fdida, José Ferreira de Rezende
, Otto Carlos Muniz Bandeira Duarte:
Similarity models for Internet host location. 81-86 - M. J. Sim, Guven Mercankosk:
Superposition of periodic streams - interval of significance. 87-92 - Jaeyong Lim, Sanguthevar Rajasekaran:
Fast IP lookup algorithms. 93-97 - Hossein Mohammadi, Nasser Yazdani, Behnam Robatmili, Mehrdad Nourani:
HASIL: hardware assisted software-based IP lookup for large routing tables. 99-104 - Hidekazu Miyoshi, John S. Thompson:
SIRS: selective intersected rule search for packet classification. 105-110 - Kang Li, Francis Chang, Damien Berger, Wu-chang Feng:
Architectures for packet classification caching. 111-117 - Thanh Vinh Nguyen, Chun Tung Chou, Paul Boustead:
Provisioning content distribution networks over shared infrastructure. 119-124 - Novella Bartolini, Francesco Lo Presti, Chiara Petrioli:
Optimal dynamic replica placement in content delivery networks. 125-130 - Ta Nguyen Binh Duong, Suiping Zhou:
A dynamic load sharing algorithm for massively multiplayer online games. 131-136 - Grenville J. Armitage:
An experimental estimation of latency sensitivity in multiplayer Quake 3. 137-141 - Purnima M. Mavinkurve, Hung Q. Ngo, Himanshu Mehra:
MIP3S: algorithms for power-conserving multicasting in static wireless ad hoc networks. 143-148 - Jean Frédéric Myoupo:
Dynamic initialization protocols for mobile ad hoc networks. 149-154 - Markus Borschbach, Wolfram-Manfred Lippe:
A local optimum selection criterion for the physical neighbor connectivity of ad hoc networks. 155-160 - Gaurav Srivastava, Paul Boustead, Joe F. Chicharo, Christopher Ware:
TCMCA: a source-based distributed topology control algorithm for mission critical applications in mobile ad-hoc networks. 161-166 - Jianjian Bian, Sunil P. Khatri:
IP routing table compression using ESPRESSO-MV. 167-172 - Jason Rouse:
Probabilistic modeling in support of preemptive congestion control. 173-178 - Somnuk Puangpronpitag, Roger Boyle, Karim Djemame
:
Explicit rate adjustment: an efficient congestion control protocol for layered multicast. 179-184 - Feng Shi, Ke Xu, Jianping Wu:
An equation-based network-supported for layered multicast congestion control. 185-189 - Shin-Hung Chang, Ray-I Chang, Jan-Ming Ho, Yen-Jen Oyang:
PSC: a priority selected cache algorithm for streaming video over Internet. 191-196 - Carmelo Ragusa, Antonio Liotta, George Pavlou:
A scalable application-level multicast approach based on mobile agents. 197-202 - Moufida Maimour
, Cong-Duc Pham:
Dealing with heterogeneity in a fully reliable multicast protocol. 203-209 - Sanchai Rattananon, Björn Landfeldt, Aruna Seneviratne:
Extending REBEKAH-IP with central port allocations for un-ambiguous IPv4 address expansion. 211-216 - Gustav Rosenbaum, William Lau, Sanjay K. Jha
:
Recent directions in virtual private network solutions. 217-223 - Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp:
A hybrid QoS routing strategy for suburban ad-hoc networks. 225-230 - Illya Stepanov, Jörg Hähner
, Christian Becker, Jing Tian, Kurt Rothermel:
A meta-model and framework for user mobility in mobile networks. 231-238 - Chang Woo Pyo, Jie Li
, Hisao Kameda:
Simulation studies on dynamic and distributed domain-based mobile IPv6 mobility management. 239-244 - Jun-seob Lee, Jae Hong Min, Ki-Shik Park, Sang-Ha Kim:
Paging extension for hierarchical mobile IPv6: P-HMIPv6. 245-248 - Ernesto Exposito, Patrick Sénac, Michel Diaz:
FPTP: the XQoS aware and fully programmable transport protocol. 249-254 - Armando L. Caro Jr., Paul D. Amer, Janardhan R. Iyengar, Randall R. Stewart:
Retransmission policies with transport layer multihoming. 255-260 - Damien Phillips, Jiankun Hu
, Bill Lloyd-Smith, Richard Harris:
A note on an analytic model for slow start in TCP. 261-264 - Xuezheng Liu, Guangwen Yang, Dingxing Wang:
Stationary and adaptive replication approach to data availability in structured peer-to-peer overlay networks. 265-270 - Thomas Fuhrmann:
On the topology of overlay-networks. 271-276 - Tim Hsin-Ting Hu, Aruna Sereviratne:
General clusters in peer-to-peer networks. 277-282 - Aaron Harwood, Minh Truong:
Multi-space distributed hash tables for multiple transport domains. 283-287 - Dongliang Guan, Songyu Yu:
A two-level patching scheme for video multicast. 289-293 - Eduard Popovici, Ralf Mahlo, Mario Zühlke, Hartmut König:
Consistency support for a decentralized management in close multiparty conferences using SIP. 295-300 - Alexander A. Kist, Richard J. Harris:
Using virtual SIP links to enable QoS for signalling. 301-306 - Paul Hatalsky, Hugh Smith, Matthew Carlton:
Call admission control for video phone applications. 307-312 - Matthew Burnside, Angelos D. Keromytis:
Accelerating application-level security protocols. 313-318 - Marcel Bennicke, Peter Langendörfer
:
Towards automatic negotiation of privacy contracts for Internet services. 319-324 - Rongbo Du, Reihaneh Safavi-Naini, Willy Susilo
:
Web filtering using text classification. 325-330 - Geon Woo Kim, Jong-Wook Han, Dong-Il Seo:
Mobile IPv6 security while traversing a NAT. 331-335 - Laurent Lancérica, Laurent Dairaine, Jérôme Lacan:
Evaluation of content-access QoS for various dissemination strategies in peer to peer networks. 337-342 - Wei Ye, Asad I. Khan, Elizabeth A. Kendall:
Distributed network file storage for a serverless (P2P) network. 343-347 - Chao-Yang Wang, Feng Zhou, Yao-Long Zhu, Tow Chong Chong, Bo Hou, Wei-Ya Xi:
Simulation of fibre channel storage area network using SANSim. 349-354 - Rui M. F. Coelho, Joel J. P. C. Rodrigues, Mário M. Freire
:
High performance optical Internet backbones with mesh topologies. 355-359 - Dirk Abendroth, Ulrich Killat:
Effective bandwidth shaping: a framework for resource dimensioning. 361-366 - Seungwan Ryu, Jung-Sook Bae:
Design of a pro-active queue management. 367-372 - Guoqiang Mao
, Daryoush Habibi:
Connection admission control - closing the loop. 373-378 - Tarith Devadason, Guven Mercankosk:
Observations on a class of rate-based schedulers. 379-384 - Amitabh Saxena, Ben Soh:
A new paradigm for group cryptosystems using quick keys. 385-389 - Junqi Zhang, Vijay Varadharajan, Yi Mu:
A novel dynamic key management scheme for secure multicasting. 391-395 - Amitabh Saxena, Ben Soh:
Contributory approaches to centralized key agreement in dynamic peer groups. 397-402 - Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Dekai Li:
A cooperative immunization system for an untrusting Internet. 403-408 - Javier Aracil, Mikel Izal, Daniel Morató, Eduardo Magaña:
Multiresolution analysis of optical burst switching traffic. 409-412 - Konstantinos V. Miliotis, Georgios I. Papadimitriou, Andreas S. Pomportsis:
Adaptive weight functions for wavelength-continuous WDM multi-fiber networks. 413-418 - Tomoya Kitani, Masataka Yonedu, Nobuo Funabiki, Tom Nakanishi, Kiyohiko Okayama, Teruo Higashino:
A two-stage hierarchical algorithm for wavelength assignment in WDM-based Bidirectional Manhattan Street Networks. 419-424 - Raja Datta, Sujoy Ghose, Indranil Sengupta:
A rerouting technique with minimum traffic disruption for dynamic traffic in WDM networks. 425-430 - Claus Bauer:
Packet scheduling in input - queued switches with a speedup of less than two. 431-436 - Teck Meng Lim, Bu-Sung Lee, Chai Kiat Yeo
:
Weighted deficit earliest departure first scheduling. 437-442 - Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:
Distributed bandwidth reservation by probing for available bandwidth. 443-448 - Lars-Olof Burchard:
On the performance of computer networks with advance reservation mechanisms. 449-454 - Udaya Kiran Tupakula, Vijay Varadharajan:
Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture. 455-460 - Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
WebSOS: protecting web servers from DDoS attacks. 461-466 - Toshiaki Ogawa, Fumitaka Nakamura, Yasushi Wakahara:
Branch label based probabilistic packet marking for IP traceback. 467-474 - Jenshiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung:
Efficient dynamic probabilistic packet marking for IP traceback. 475-480 - Nicolas Montavont, Thomas Noël:
A new middleware for pervasive IPv6 mobile computing. 481-488 - Klaus Darilion, Wolfgang Kampichler, Karl M. Göschka:
Event-based radio communication signalling using the session initiation protocol. 489-494 - Moo Young Kim, W. Bastiaan Kleijn
:
Rate-distortion comparisons between FEC and MDC based on Gilbert channel model. 495-500 - Ming Li, Doan B. Hoang, Andrew James Simmonds:
Fair intelligent admission control over DiffServ network. 501-506 - Timothy Chee-Kin Hui, Chen-Khong Tham:
Reinforcement learning-based dynamic bandwidth provisioning for quality of service in differentiated services networks. 507-512 - Hannan Xiao
, Kee Chaing Chua:
Adaptive ingress admission control for differentiated services. 513-518 - Chee-Wei Tan, Chen-Khong Tham
:
Efficient implementation of relative differentiated services using proportional probabilistic priority. 519-524 - J. D. Judd, John C. McEachen, James Bret Michael, Daniel W. Ettlich:
Network stream splitting for intrusion detection. 525-530 - Xuan Dau Hoang
, Jiankun Hu
, Peter Bertók
:
A multi-layer model for anomaly intrusion detection using program sequences of system calls. 531-536 - Omesh Tickoo, Satish Raghunath, Shivkumar Kalyanaraman:
Route fragility: a novel metric for route selection in mobile ad hoc networks. 537-542 - Ying Zhang, Aniruddha Rangnekar, Ali Aydin Selçuk
, Ali Biçak, Deepinder P. Sidhu:
A performance comparison of zone-based multicast protocols for mobile ad hoc networks. 543-548 - Robin Chellappa Doss, Andrew Jennings, Nirmala Shenoy:
Route discovery and reconstruction in mobile ad hoe networks. 549-554 - Chun-Hung Richard Lin, Guo-Yuan Mikko Wang:
A duplicate address resolution protocol in mobile ad hoe networks. 555-560 - Yen-Cheng Chen, Yao-Jung Chan, Cheung-Wo She:
Enabling location-based services on wireless LANs. 567-572 - Yunli Chen, Qing-An Zeng, Dharma P. Agrawal:
Performance analysis of IEEE 802.11e enhanced distributed coordination function. 573-578 - Yuki Moritani, Yukio Atsumi:
Efficient bandwidth utilization through multicast receiver aggregation in wireless LAN spot. 579-584 - Chunhung Richard Lin, Yuan-Hao Johnson Chang:
AAR: an adaptive rate control protocol for mobile ad hoc networks. 585-590 - Justin Lipman
, Paul Boustead, Joe F. Chicharo, John Judge:
Resource aware information dissemination in ad hoc networks. 591-596 - J. Ye, W. C. Wong, Kee Chaing Chua:
Power-efficient multicasting in ad hoc networks. 597-602 - Ramin Hekmat, Piet Van Mieghem:
Degree distribution and hopcount in wireless ad-hoc networks. 603-609 - Pratik Das, Jamil Y. Khan:
Variable bit rate packet data over the WCDMA uplink. 611-616 - Bang Wang, Kee Chaing Chua:
Transmission control policy for data services over a time-varying wireless channel. 617-621 - Amoakoh Gyasi-Agyei:
BL2xF - channel state-dependent scheduling algorithms for wireless IP networks. 623-628 - Salah-Eddine Elayoubi, Tijani Chahed, Gérard Hébuterne:
Resource management in UMITS : from admission control to packet scheduling. 629-634 - S. Malarvizhi, B. Ramkumar, N. Sabarinathan, M. Meenakshi
:
A new MAC protocol based on collision resolution and spread spectrum coding. 635-640 - Wei-Yeh Chen, Jean-Lien C. Wu, Haw-Yun Shin:
Performance analysis of dynamic resource allocation with finite buffers in cellular networks. 641-646 - Kuo-Chung Chu
, Frank Yeong-Sung Lin, Shin-Fu Wang:
An admission control algorithm for CDMA networks. 647-652 - Alfandika Nyandoro, Prawit Chumchu
, Mahbub Hassan:
Soft per-flow throughput guarantees in contention based WLANs. 653-658 - Sagar Dharia, Dharma P. Agrawal:
A novel distributed resource-aware scalable scheme for Scatternet formation. 659-664 - Timothy F. Kneeland, Richard A. Raines, Michael A. Temple, Rusty O. Baldwin:
Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices. 665-671 - Balázs Bakos, Gergely Csúcs, Lóránt Farkas, Jukka K. Nurminen:
Peer-to-peer protocol evaluation in topologies resembling wireless networks. An experiment with Gnutella query engine. 673-680 - Neha Jain, Dilip K. Madathil, Dharma P. Agrawal:
Exploiting multi path routing to achieve service differentiation in sensor networks. 681-686 - Greg Daley, Brett Pentland, Richard Nelson:
Movement detection optimizations in mobile IPv6. 687-692 - Rungrat Wiangsripanawan, Reihaneh Safavi-Naini, Willy Susilo
:
Securing mobile IP enabled laptop. 693-698 - Ricky Robinson, Jadwiga Indulska
:
Superstring: a scalable service discovery protocol for the wide-area pervasive environment. 699-704 - Sasitharan Balasubramaniam
, Jadwiga Indulska
:
Vertical handovers as adaptation methods in pervasive systems. 705-710 - Tomohiro Nakagawa, Takashi Yoshikawa, Ken Ohta
, Shoji Kurakake:
Flexible route control for wireless multi-hop internet access. 711-716 - Kent Pedersen, Benoist Sebire, Guillaume Sebire, Glenn Platt:
ARQ considerations for the new GSM/EDGE flexible layer one. 717-722 - Christophe S. Jelger, Thomas Noël:
Performance evaluation of multicast transmissions with mobile sources. 723-728 - Shaobin Cai, Xiao-Zong Yang, Wenbin Yao:
A comparison between the PoolODMRP and the PatchODMRP. 729-735
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.