default search action
18th ICNP 2010: Kyoto, Japan
- Proceedings of the 18th annual IEEE International Conference on Network Protocols, ICNP 2010, Kyoto, Japan, 5-8 October, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8644-1
- Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang:
Routing in max-min fair networks: A game theoretic approach. 1-10 - Fernando A. Kuipers, Anteneh Beshir, Ariel Orda, Piet Van Mieghem:
Impairment-aware path selection and regenerator placement in translucent optical networks. 11-20 - Mingui Zhang, Cheng Yi, Bin Liu, Beichuan Zhang:
GreenTE: Power-aware traffic engineering. 21-30 - Zhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam:
Fast routing table lookup based on deterministic multi-hashing. 31-40 - Jiangwei Zhou, Yu Chen, Ben Leong, Boqin Feng:
Practical Virtual Coordinates for large wireless sensor networks. 41-51 - Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Jun Huang, Mo Sha, Liusheng Huang:
Passive interference measurement in Wireless Sensor Networks. 52-61 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Junliang Liu, Jun Luo:
ETOC: Obtaining robustness in component-based localization. 62-71 - Yiyang Li, Jianxia Ning, Zhengyuan Xu, Srikanth V. Krishnamurthy, Gang Chen:
UVOC-MAC: A MAC protocol for outdoor ultraviolet networks. 72-81 - Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, Philip Alexander Levis:
Granting silence to avoid wireless collisions. 82-91 - Raju Kumar, Srikar Tati, Felipe de Mello, Srikanth V. Krishnamurthy, Thomas La Porta:
Network Coding aware Rate Selection in multi-rate IEEE 802.11. 92-102 - Alexander J. T. Gurney, Timothy G. Griffin:
Neighbor-specific BGP: An algebraic exploration. 103-112 - Luca Cittadini, Giuseppe Di Battista, Thomas Erlebach, Maurizio Patrignani, Massimo Rimondini:
Assigning AS relationships to satisfy the Gao-Rexford conditions. 113-123 - Zied Ben-Houidi, Mickael Meulle:
A new VPN routing approach for large scale networks. 124-133 - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu:
TowerDefense: Deployment strategies for battling against IP prefix hijacking. 134-143 - Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang:
Identifying suspicious activities through DNS failure graph analysis. 144-153 - Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu:
Identification-free batch authentication for RFID tags. 154-163 - Yating Hsu, David Lee:
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization. 164-173 - Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda:
Firewall modules and modular firewalls. 174-182 - Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, Mario Gerla:
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks. 183-192 - Wei Gao, Guohong Cao:
On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks. 193-202 - Md. Yusuf Sarwar Uddin, Brighten Godfrey, Tarek F. Abdelzaher:
RELICS: In-network realization of incentives to combat selfishness in DTNs. 203-212 - Chuan Han, Yaling Yang, Yongxiang Peng:
Optimal cache-based route repair for real-time traffic. 213-222 - Zhenyu Yang, Ming Li, Wenjing Lou:
CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. 223-232 - Joon Yoo, Brian Sung Chul Choi, Mario Gerla:
An opportunistic relay protocol for vehicular road-side access with fading channels. 233-242 - Kebin Liu, Mo Li, Yunhao Liu, Xiang-Yang Li, Minglu Li, Huadong Ma:
Exploring the hidden connectivity in urban vehicular networks. 243-252 - Shaoquan Zhang, Ziyu Shao, Minghua Chen:
Optimal distributed P2P streaming under node degree bounds. 253-262 - Matthew J. Probst, Jun Cheol Park, Ravin Abraham, Sneha Kumar Kasera:
SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution. 263-274 - Yuan Feng, Baochun Li, Bo Li:
Peer-assisted VoD prefetching in double auction markets. 275-284 - Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck:
TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation. 285-294 - Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:
Scalable video multicast with joint layer resource allocation in broadband wireless networks. 295-304 - Jun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou:
Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance. 305-314 - Teruo Higashino, Kenji Suzuki:
Message from the General Co-Chairs. 1-2 - Sonia Fahmy, Toru Hasegawa:
Message from the technical program committee chairs. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.