Default Cover Image

2012 20th IEEE International Conference on Network Protocols (ICNP 2012)

Oct. 30 2012 to Nov. 2 2012

Austin, TX

Table of Contents

Papers
Author indexsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Papers
Table of contentFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Papers
[Spine]Full-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
[Title page]Full-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
TUNOS: A novel SDN-oriented networking operating systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
A content provider mobility solution of named data networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
CORONET: Fault tolerance for Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Umbrella: A routing choice feedback based distributed inter-domain anti-spoofing solutionFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Integration testing of protocol implementations using symbolic distributed executionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Reduction-based security analysis of Internet routing protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Towards a rigorous analysis of AODVv2 (DYMO)Full-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
A diversified and correct-by-construction broadcast serviceFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Verification and synthesis of firewalls using SAT and QBFFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Assessing the security of a clean-slate Internet architectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Evaluating sinkhole defense techniques in RPL networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
A proactive scheme for securing ID/locator split architectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Key splitting for random key distribution schemesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
VCP: A virtualization cloud platform for SDN intra-domain production networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
An architecture for collaborative driving systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Detecting the unintended in BGP policiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Optimal vehicles and coding decision for mobile data sharing in Vehicular Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Global Resolution Service for mobility support in the internetFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Virtual routing tables polymerization for lookup and updateFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
AFEC: A method of aggregating forwarding equivalence classes based on overlapped pathsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Symbol-level detection: A new approach to silencing hidden terminalsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
A formally-verified migration protocol for mobile, multi-homed hostsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Papers
Buddyguard: A buddy system for fast and reliable detection of IP prefix anomaliesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Marooned magic numbers - An adaptive congestion control architectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Papers
Airlift: Video conferencing as a cloud service using inter-datacenter networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Papers
Using DCCP: Issues and improvementsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
A distributed routing protocol for predictable rates in wireless mesh networksyFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
On minimum delay duty-cycling protocol in sustainable sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
FAST: A channel access protocol for wireless video (and non-video) trafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Forensic analysis of packet losses in wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth costFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Detecting unsafe BGP policies in a flexible worldFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Towards the optimal caching strategies of peer-assisted VoD systems with HD channelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow ControlFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Minimizing inter-server communications by exploiting self-similarity in online social networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Delay-based congestion control for multipath TCPFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
ROME: Routing on metropolitan-scale EthernetFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
eDiscovery: Energy efficient device discovery for mobile opportunistic communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Practical control of transmission power for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
SMART: Lightweight distributed Social Map based Routing in Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Social-P2P: Social network-based P2P file sharing systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
An ultra-fast universal incremental update algorithm for trie-based routing lookupFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Efficient and privacy-preserving data aggregation in mobile sensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Towards bandwidth guarantee in multi-tenancy cloud computing networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Energy balanced data collection in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Range-free localization using grid graph extractionFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Papers
Cost optimization for Online Social Networks on geo-distributed cloudsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
D-Fi: A diversity-aware Wi-Fi using an OFDM-based Bloom filterFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Showing 58 out of 58