Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICNP
ICNP 2012
Generate Citations
2012 20th IEEE International Conference on Network Protocols (ICNP 2012)
Oct. 30 2012 to Nov. 2 2012
Austin, TX
Table of Contents
Papers
Author indexs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
Papers
Table of content
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
Papers
[Spine]
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
Papers
[Title page]
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
2012 20th IEEE International Conference on Network Protocols (ICNP) [Copyright notice]
Freely available from IEEE.
pp. 1-1
Papers
TUNOS: A novel SDN-oriented networking operating system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
Papers
A content provider mobility solution of named data networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Xiaoke Jiang
,
Jun Bi
,
You Wang
,
Pingping Lin
,
Zhaogeng Li
Papers
CORONET: Fault tolerance for Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Hyojoon Kim
,
Mike Schlansker
,
Jose Renato Santos
,
Jean Tourrilhes
,
Yoshio Turner
,
Nick Feamster
Papers
Umbrella: A routing choice feedback based distributed inter-domain anti-spoofing solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Jie Li
,
Jun Bi
,
Jianping Wu
Papers
Integration testing of protocol implementations using symbolic distributed execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Raimondas Sasnauskas
,
Philipp Kaiser
,
Russ Lucas Jukic
,
Klaus Wehrle
Papers
Reduction-based security analysis of Internet routing protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chen Chen
,
Limin Jia
,
Boon Thau Loo
,
Wenchao Zhou
Papers
Towards a rigorous analysis of AODVv2 (DYMO)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sarah Edenhofer
,
Peter Hofner
Papers
A diversified and correct-by-construction broadcast service
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vincent Rahli
,
Nicolas Schiper
,
Robbert Van Renesse
,
Mark Bickford
,
Robert L. Constable
Papers
Verification and synthesis of firewalls using SAT and QBF
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shuyuan Zhang
,
Abdulrahman Mahmoud
,
Sharad Malik
,
Sanjai Narain
Papers
Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic models
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Debbie Perouli
,
Stefano Vissicchio
,
Alexander Gurney
,
Olaf Maennel
,
Timothy G. Griffin
,
Iain Phillips
,
Sonia Fahmy
,
Cristel Pelsser
Papers
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Seungwon Shin
,
Guofei Gu
Papers
Assessing the security of a clean-slate Internet architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Gowtham Boddapati
,
John Day
,
Ibrahim Matta
,
Lou Chitkushev
Papers
Evaluating sinkhole defense techniques in RPL networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kevin Weekly
,
Kristofer Pister
Papers
To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fahad A. Arshad
,
Gaspar Modelo-Howard
,
Saurabh Bagchi
Papers
A proactive scheme for securing ID/locator split architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ruidong Li
,
Ved P. Kafle
,
Hiroaki Harai
Papers
Key splitting for random key distribution schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohammad Ehdaie
,
Nikos Alexiou
,
Mahmoud Ahmadian
,
Mohammad Reza Aref
,
Panos Papadimitratos
Papers
VCP: A virtualization cloud platform for SDN intra-domain production network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
Papers
An architecture for collaborative driving systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Shou-pon Lin
,
Nicholas F. Maxemchuk
Papers
Detecting the unintended in BGP policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Debbie Perouli
,
Timothy G. Griffin
,
Olaf Maennel
,
Sonia Fahmy
,
Iain Phillips
,
Cristel Pelsser
Papers
Optimal vehicles and coding decision for mobile data sharing in Vehicular Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
Papers
Global Resolution Service for mobility support in the internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
You Wang
,
Jun Bi
,
Chenghui Peng
Papers
Virtual routing tables polymerization for lookup and update
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Tong Yang
,
Shenjiang Zhang
,
Xianda Sun
,
Huichen Dai Ruian Duan
,
Jianyuan Lu
,
Zhian Mi
,
Bin Liu
Papers
AFEC: A method of aggregating forwarding equivalence classes based on overlapped paths
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
Papers
Symbol-level detection: A new approach to silencing hidden terminals
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Tao Xiong
,
Jin Zhang
,
Junmei Yao
,
Wei Lou
Papers
A formally-verified migration protocol for mobile, multi-homed hosts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Matvey Arye
,
Erik Nordstrom
,
Robert Kiefer
,
Jennifer Rexford
,
Michael J. Freedman
Papers
Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jun Li
,
Toby Ehrenkranz
,
Paul Elliott
Papers
A semantics aware approach to automated reverse engineering unknown protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yipeng Wang
,
Xiaochun Yun
,
M. Zubair Shafiq
,
Liyan Wang
,
Alex X. Liu
,
Zhibin Zhang
,
Danfeng Yao
,
Yongzheng Zhang
,
Li Guo
Papers
Marooned magic numbers - An adaptive congestion control architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Somaya Arianfar
,
Pasi Sarolahti
,
Jorg Ott
Papers
Airlift: Video conferencing as a cloud service using inter-datacenter networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Yuan Feng
,
Baochun Li
,
Bo Li
Papers
Using DCCP: Issues and improvements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Michael Schier
,
Michael Welzl
Papers
A distributed routing protocol for predictable rates in wireless mesh networksy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Behnaz Arzani
,
Roch Guerin
,
Alejandro Ribeiro
Papers
On minimum delay duty-cycling protocol in sustainable sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Shaojie Tang
,
Jie Wu
,
Guihai Chen
,
Cheng Wang
,
Xuefeng Liu
,
Tao Li
,
Xiang-Yang Li
Papers
FAST: A channel access protocol for wireless video (and non-video) traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Sohraab Soltani
,
Hassan Aqeel Khan
,
Hayder Radha
Papers
Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
George Papageorgiou
,
Shailendra Singh
,
Srikanth V. Krishnamurthy
,
Ramesh Govindan
,
Tom La Porta
Papers
Forensic analysis of packet losses in wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jianxia Ning
,
Shailendra Singh
,
Konstantinos Pelechrinis
,
Bin Liu
,
Srikanth V. Krishnamurthy
,
Ramesh Govindan
Papers
Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Lei Yu
,
Karan Sapra
,
Haiying Shen
,
Lin Ye
Papers
Detecting unsafe BGP policies in a flexible world
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Debbie Perouli
,
Timothy G. Griffin
,
Olaf Maennel
,
Sonia Fahmy
,
Cristel Pelsser
,
Alexander Gurney
,
Iain Phillips
Papers
Towards the optimal caching strategies of peer-assisted VoD systems with HD channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Le Chang
,
Jianping Pan
Papers
Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yin Xu
,
Wai Kay Leong
,
Ben Leong
,
Ali Razeen
Minimizing inter-server communications by exploiting self-similarity in online social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hanhua Chen
,
Hai Jin
,
Ning Jin
,
Tao Gu
Papers
Delay-based congestion control for multipath TCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yu Cao
,
Mingwei Xu
,
Xiaoming Fu
Papers
ROME: Routing on metropolitan-scale Ethernet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Chen Qian
,
Simon S. Lam
Papers
eDiscovery: Energy efficient device discovery for mobile opportunistic communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Bo Han
,
Aravind Srinivasan
Papers
Practical control of transmission power for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yong Fu
,
Mo Sha
,
Gregory Hackmann
,
Chenyang Lu
Papers
SMART: Lightweight distributed Social Map based Routing in Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kang Chen
,
Haiying Shen
Papers
Social-P2P: Social network-based P2P file sharing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ze Li
,
Haiying Shen
Papers
An ultra-fast universal incremental update algorithm for trie-based routing lookup
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Tong Yang
,
Zhian Mi
,
Ruian Duan
,
Xiaoyu Guo
,
Jianyuan Lu
,
Shenjiang Zhang
,
Xianda Sun
,
Bin Liu
Papers
Efficient and privacy-preserving data aggregation in mobile sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Qinghua Li
,
Guohong Cao
Papers
Towards bandwidth guarantee in multi-tenancy cloud computing networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jing Zhu
,
Dan Li
,
Jianping Wu
,
Hongnan Liu
,
Ying Zhang
,
Jingcheng Zhang
Papers
Energy balanced data collection in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ning Jin
,
Kaiji Chen
,
Tao Gu
Papers
Range-free localization using grid graph extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Takeshi Kubo
,
Atsushi Tagami
,
Teruyuki Hasegawa
,
Toru Hasegawa
,
Jean Walrand
Papers
Cost optimization for Online Social Networks on geo-distributed clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Lei Jiao
,
Jun Li
,
Tianyin Xu
,
Xiaoming Fu
Papers
D-Fi: A diversity-aware Wi-Fi using an OFDM-based Bloom filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Suchul Lee
,
Chong-Kwon Kim
Showing 58 out of 58