Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICNP
ICNP 2006
Generate Citations
Proceedings of the 2006 IEEE International Conference on Network Protocols
Nov. 12 2006 to Nov. 15 2006
Santa Barbara, CA
Table of Contents
14th IEEE International Conference on Network Protocols
Freely available from IEEE.
pp. nil2
External reviewers
Freely available from IEEE.
Internet Cache Pollution Attacks and Countermeasures
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-64
by
Yan Gao
,
Leiwen Deng
,
Aleksandar Kuzmanovic
,
Yan Chen
Papers
Covers
Full-text access may be available. Sign in or learn about subscription options.
pp. C1
Papers
14th IEEE International Conference on Network Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. nil1
Papers
Copyright page
Full-text access may be available. Sign in or learn about subscription options.
pp. nil3
Papers
Table of Contents
Freely available from IEEE.
pp. v-ix
Papers
Message from the General Chair
Freely available from IEEE.
pp. x-xi
Heterogeneous Congestion Control: Efficiency, Fairness and Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-136
by
Mung Chiang
,
S.H. Low
,
D. Wei
,
Ao Tang
,
Mung Chiang
,
S.H. Low
,
D. Wei
,
Ao Tang
Papers
Message from the Technical Program Committee Chair
Freely available from IEEE.
pp. xii-xiii
Throughput Guaranteed Restorable Routing Without Traffic Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-146
by
M. Kodialam
,
T. V. Lakshman
,
Sudipta Sengupta
Papers
Committees
Freely available from IEEE.
pp. xiv-xvi
Papers
Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-11
by
Vidhyashankar Venkataraman
,
Kaouru Yoshida
,
Paul Francis
Papers
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-21
by
Mei Li
,
Wang-chien Lee
,
Anand Sivasubramaniam
Papers
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-31
by
Jinsong Han
,
Yunhao Liu
Papers
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-41
by
Zhongmei Yao
,
Derek Leonard
,
Xiaoming Wang
,
Dmitri Loguinov
Papers
Forensic Analysis for Epidemic Attacks in Federated Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-53
by
Yinglian Xie
,
Vyas Sekar
,
Michael Reiter
,
Hui Zhang
Papers
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-74
by
AAron Walters
,
David Zage
,
Cristina Nita-Rotaru
Papers
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-84
by
Jakob Eriksson
,
Srikanth Krishnamurthy
,
Michalis Faloutsos
Papers
Impact of Routing Metrics on Path Capacity in Multirate and Multihop Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-95
by
Hongqiang Zhai
,
Yuguang Fang
Papers
Reducing Congestion Effects in Wireless Networks by Multipath Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-105
by
Lucian Popa
,
Costin Raiciu
,
Ion Stoica
,
David Rosenblum
Papers
Orthogonal Rendezvous Routing Protocol for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-115
by
Bow-nan Cheng
,
Murat Yuksel
,
Shivkumar Kalyanaraman
Papers
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-126
by
Adam Biltcliffe
,
Michael Dales
,
Sam Jansen
,
Thomas Ridge
,
Peter Sewell
Papers
Scaling IP Routing with the Core Router-Integrated Overlay
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-156
by
Xinyang Zhang
,
Paul Francis
,
Jia Wang
,
Kaoru Yoshida
O-MAC: A Receiver Centric Power Management Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-320
by
Hui Cao
,
Kenneth W. Parker
,
Anish Arora
Papers
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-167
by
Qiming Li
,
Dah-ming Chiu
,
John C.S. Lui
Papers
Vault: A Secure Binding Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-177
by
Guor-huar Lu
,
Changho Choi
,
Zhi-li Zhang
Papers
Key Grids: A Protocol Family for Assigning Symmetric Keys
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-186
by
Amitanand Aiyer
,
Lorenzo Alvisi
,
Mohamed Gouda
Papers
High Speed Pattern Matching for Network IDS/IPS
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-196
by
Mansoor Alicherry
,
M. Muthuprasanna
,
Vijay Kumar
Papers
Virtual Surrounding Face Geocasting with Guaranteed Message Delivery for Ad Hoc and Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-207
by
Jie Lian
,
Kshirasagar Naik
,
Yunhao Liu
,
Lei Chen
Papers
Benefit-based Data Caching in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-217
by
Bin Tang
,
Himanshu Gupta
,
Samir Das
Papers
A Distributed Algorithm for Joint Sensing and Routing in Wireless Networks with Non-Steerable Directional Antennas
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-227
by
Chun Zhang
,
Jim Kurose
,
Yong Liu
,
Don Towsley
,
Michael Zink
Papers
RAIN: A Reliable Wireless Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-237
by
Chaegwon Lim
,
Haiyun Luo
,
Chong-ho Choi
Papers
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-248
by
Bin Fan
,
Dah-ming Chiu
,
John Lui
Papers
Modeling and Caching of Peer-to-Peer Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-258
by
Osama Saleh
,
Mohamed Hefeeda
Papers
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-268
by
Srinivasan Seetharaman
,
Mostafa Ammar
Papers
Robust Path-Vector Routing Despite Inconsistent Route Preferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-279
by
Aaron Jaggard
,
Vijay Ramachandran
Papers
Differentiated BGP Update Processing for Improved Routing Convergence
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-289
by
Wei Sun
,
Zhuoqing Mao
,
Kang Shin
Papers
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-299
by
Josh Karlin
,
Stephanie Forrest
,
Jennifer Rexford
Papers
Robust Egress Interdomain Traffic Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-309
by
Jian Qiu
,
Lixin Gao
Papers
Dynamic Conflict-free Query Scheduling for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-331
by
Octav Chipara
,
Chenyang Lu
,
John Stankovic
Papers
Cross-Layer Exploitation of MAC Layer Diversity in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-341
by
Min Cao
,
Vivek Raghunathan
,
P. Kumar
Papers
Author Index
Freely available from IEEE.
pp. 342
Showing 43 out of 43