Default Cover Image

13TH IEEE International Conference on Network Protocols (ICNP'05)

Nov. 6 2005 to Nov. 9 2005

Boston, MA

Table of Contents

Introduction
Message from the General Co-ChairsFreely available from IEEE.pp. ix-x
Papers
Message from the Technical Committee Co-chairsFreely available from IEEE.pp. xi-xii
Introduction
External reviewersFreely available from IEEE.pp. xv
Interdomain Routing
Expected convergence properties of BGPFull-text access may be available. Sign in or learn about subscription options.pp. 13 pp.-15
Interdomain Routing
Stable Egress Route Selection for Interdomain Traffic Engineering: Model and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 16-29
Interdomain Routing
On Understanding of Transient Interdomain Routing FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 30-39
Interdomain Routing
On the Stability of Rational, Heterogeneous Interdomain Route SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 40-52
Sensor and Ad-Hoc Protocols
Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network ExperimentFull-text access may be available. Sign in or learn about subscription options.pp. 53-62
Sensor and Ad-Hoc Protocols
Tracking Targets with Quality inWireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 63-74
Sensor and Ad-Hoc Protocols
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 75-84
Sensor and Ad-Hoc Protocols
Routing in Ad-hoc Networks with MIMO LinksFull-text access may be available. Sign in or learn about subscription options.pp. 85-98
Peer-to-Peer Protocols
MuON: Epidemic Based Mutual AnonymityFull-text access may be available. Sign in or learn about subscription options.pp. 99-109
Peer-to-Peer Protocols
Incentives to Promote Availability in Peer-to-Peer Anonymity SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 110-121
Peer-to-Peer Protocols
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 122-131
Peer-to-Peer Protocols
Z-Ring: Fast Prefix Routing via a Low Maintenance Membership ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 132-146
Geographic Routing in Ad-Hoc Networks
Path Vector Face Routing: Geographic Routing with Local Face InformationFull-text access may be available. Sign in or learn about subscription options.pp. 147-158
Geographic Routing in Ad-Hoc Networks
Simple Robotic Routing in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 159-168
Geographic Routing in Ad-Hoc Networks
Landmark Guided ForwardingFull-text access may be available. Sign in or learn about subscription options.pp. 169-178
Geographic Routing in Ad-Hoc Networks
Efficient Hop ID based Routing for Sparse Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 179-190
Overlay Protocols
Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite EventsFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Overlay Protocols
Can coexisting overlays inadvertently step on each other?Full-text access may be available. Sign in or learn about subscription options.pp. 201-214
Dimensioning and Traffic Engineering
Optimal Routing with Multiple Traffic Matrices Tradeoff between Average andWorst Case PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 215-224
Dimensioning and Traffic Engineering
Does Over-Provisioning Become More or Less Efficient as Networks Grow Larger?Full-text access may be available. Sign in or learn about subscription options.pp. 225-235
Dimensioning and Traffic Engineering
Measuring the Shared Fate of IGP Engineering and Interdomain TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 236-245
Dimensioning and Traffic Engineering
Robust Multiclass Signaling Overload ControlFull-text access may be available. Sign in or learn about subscription options.pp. 246-258
Security and Safety
Modeling and Verification of IPSec and VPN Security PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 259-278
Security and Safety
Efficient Node Admission for Short-lived Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 269-278
Security and Safety
A Family of Collusion Resistant Protocols for Instantiating SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 279-288
Security and Safety
Typed Abstraction of Complex Network CompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 289-300
Congestion Control
TCP Connection Game: A Study on the Selfish Behavior of TCP UsersFull-text access may be available. Sign in or learn about subscription options.pp. 301-310
Congestion Control
Priority Pricing in Utility Fair NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 311-320
Congestion Control
Trading Precision for Stability in Congestion Control with Probabilistic Packet MarkingFull-text access may be available. Sign in or learn about subscription options.pp. 321-331
Congestion Control
CONNET: Self-Controlled Access Links for Delay and Jitter RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 332-344
Protocol Implementation
On Static and Dynamic Partitioning Behavior of Large-Scale NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 345-357
Protocol Implementation
Shape Shifting Tries for Faster IP Route LookupFull-text access may be available. Sign in or learn about subscription options.pp. 358-367
Protocol Implementation
Efficient Probabilistic Packet MarkingFull-text access may be available. Sign in or learn about subscription options.pp. 368-377
Protocol Implementation
Intersection Characteristics of End-to-End Internet Paths and TreesFull-text access may be available. Sign in or learn about subscription options.pp. 378-390
Wireless Transport
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 391-400
Wireless Transport
Stability and Sensitivity for Congestion Control in Wireless Networks with Time Varying Link CapacitiesFull-text access may be available. Sign in or learn about subscription options.pp. 401-412
Showing 40 out of 40