Default Cover Image

Proceedings of the 2006 IEEE International Conference on Network Protocols

Nov. 12 2006 to Nov. 15 2006

Santa Barbara, CA

Table of Contents

External reviewersFreely available from IEEE.
Internet Cache Pollution Attacks and CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 54-64
Papers
CoversFull-text access may be available. Sign in or learn about subscription options.pp. C1
Papers
14th IEEE International Conference on Network ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. nil1
Papers
Copyright pageFull-text access may be available. Sign in or learn about subscription options.pp. nil3
Papers
Table of ContentsFreely available from IEEE.pp. v-ix
Papers
Message from the General ChairFreely available from IEEE.pp. x-xi
Heterogeneous Congestion Control: Efficiency, Fairness and DesignFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Papers
Message from the Technical Program Committee ChairFreely available from IEEE.pp. xii-xiii
Throughput Guaranteed Restorable Routing Without Traffic PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 137-146
Papers
CommitteesFreely available from IEEE.pp. xiv-xvi
Papers
Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 2-11
Papers
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 12-21
Papers
Rumor Riding: Anonymizing Unstructured Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 22-31
Papers
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 32-41
Papers
Forensic Analysis for Epidemic Attacks in Federated NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 43-53
Papers
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 65-74
Papers
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 75-84
Papers
Impact of Routing Metrics on Path Capacity in Multirate and Multihop Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 86-95
Papers
Reducing Congestion Effects in Wireless Networks by Multipath RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 96-105
Papers
Orthogonal Rendezvous Routing Protocol for Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 106-115
Papers
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOLFull-text access may be available. Sign in or learn about subscription options.pp. 117-126
Papers
Scaling IP Routing with the Core Router-Integrated OverlayFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
O-MAC: A Receiver Centric Power Management ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 311-320
Papers
On the Practical and Security Issues of Batch Content Distribution Via Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 158-167
Papers
Vault: A Secure Binding ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 168-177
Papers
Key Grids: A Protocol Family for Assigning Symmetric KeysFull-text access may be available. Sign in or learn about subscription options.pp. 178-186
Papers
High Speed Pattern Matching for Network IDS/IPSFull-text access may be available. Sign in or learn about subscription options.pp. 187-196
Papers
Virtual Surrounding Face Geocasting with Guaranteed Message Delivery for Ad Hoc and Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 198-207
Papers
Benefit-based Data Caching in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 208-217
Papers
RAIN: A Reliable Wireless Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 228-237
Papers
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol DesignFull-text access may be available. Sign in or learn about subscription options.pp. 239-248
Papers
Modeling and Caching of Peer-to-Peer TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 249-258
Papers
Characterizing and Mitigating Inter-domain Policy Violations in Overlay RoutesFull-text access may be available. Sign in or learn about subscription options.pp. 259-268
Papers
Robust Path-Vector Routing Despite Inconsistent Route PreferencesFull-text access may be available. Sign in or learn about subscription options.pp. 270-279
Papers
Differentiated BGP Update Processing for Improved Routing ConvergenceFull-text access may be available. Sign in or learn about subscription options.pp. 280-289
Papers
Pretty Good BGP: Improving BGP by Cautiously Adopting RoutesFull-text access may be available. Sign in or learn about subscription options.pp. 290-299
Papers
Robust Egress Interdomain Traffic EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 300-309
Papers
Dynamic Conflict-free Query Scheduling for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 321-331
Papers
Cross-Layer Exploitation of MAC Layer Diversity in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 332-341
Papers
Author IndexFreely available from IEEE.pp. 342
Showing 43 out of 43