Default Cover Image

Conference Proceedings of the 2004 IEEE International Performance, Computing, and Communications Conference

April 15 2004 to April 17 2004

Phoenix, AZ, USA

Table of Contents

IPCCC 2004 Executive CommitteeFreely available from IEEE.pp. v-v
IPCCC 2004 Technical Program CommitteeFreely available from IEEE.pp. vi-vi
Workshop on end-to-end service differentiation (EESD) 2004Freely available from IEEE.pp. viii-viii
Workshop on information assurance (WIA) 2004Freely available from IEEE.pp. viii-viii
Workshop on multihop wireless networks (MWN) 2004Freely available from IEEE.pp. ix-x
Panel II: PKI to the massesFreely available from IEEE.pp. x-xi
Session 1.1 MulticastFreely available from IEEE.pp. 3-3
Improving server broadcast efficiency through better utilization of client receiving bandwidthFull-text access may be available. Sign in or learn about subscription options.pp. 5-12
A buffer management scheme for tree-based reliable multicast using infrequent acknowledgmentsFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Selection algorithms for anycast relay routingFull-text access may be available. Sign in or learn about subscription options.pp. 21-27
Session 1.2 Network PlanningFreely available from IEEE.pp. 29-29
Aggressive telecommunications overbooking ratiosFull-text access may be available. Sign in or learn about subscription options.pp. 31-38
Settlement and capacity planning in multi-service provider infrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Algebraic geometric code based IP tracebackFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Session 2.1 Wireless Resource ManagementFreely available from IEEE.pp. 59-59
Connection-level performance analysis for adaptive bandwidth allocation in multimedia wireless cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Adaptive channel switching for admission control with QoS and priority in WCDMA uplinkFull-text access may be available. Sign in or learn about subscription options.pp. 69-76
Session 2.2 Network ManagementFreely available from IEEE.pp. 85-85
Toward efficient distributed network monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 87-94
Admission control in deadline-based network resource managementFull-text access may be available. Sign in or learn about subscription options.pp. 95-102
Session 3.1 RoutingFreely available from IEEE.pp. 113-113
Survivable multipath routing using link penalizationFull-text access may be available. Sign in or learn about subscription options.pp. 115-122
Benchmarks for IP forwarding tablesFull-text access may be available. Sign in or learn about subscription options.pp. 123-130
Damping BGP route flapsFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Session 3.2 Short Papers IFreely available from IEEE.pp. 139-139
Channel state dependent robust TCP/IP header compression for 3G wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 141-145
Interplay of service differentiation and routing mechanisms in MANETs: a performance studyFull-text access may be available. Sign in or learn about subscription options.pp. 147-151
Framework for performance analysis of channel-aware wireless schedulersFull-text access may be available. Sign in or learn about subscription options.pp. 153-157
Predicting node location in a PCS networkFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
A cluster based secure routing scheme for wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 171-175
Session 3.3 EESD General Service DifferentiationFreely available from IEEE.pp. 177-177
CGRED: class guided random early discardingFull-text access may be available. Sign in or learn about subscription options.pp. 179-185
Capacity provisioning in DiffServ/MPLS networks based on correlated traffic inputsFull-text access may be available. Sign in or learn about subscription options.pp. 187-193
SONAR: a platform for flexible DiffServ/MPLS traffic engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 195-201
Session 4.1 Bandwidth ManagementFreely available from IEEE.pp. 205-205
Available bandwidth measurement using Poisson probing on the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Optimization of the bandwidth distribution scheme for handling topology changesFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
Compositional layered performance modeling of peer-to-peer routing softwareFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Session 4.2 Short Papers IIFreely available from IEEE.pp. 239-239
A performance analysis of the sockets direct protocol (SDP) with asynchronous I/O over 4X InfiniBandFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Analysis and improvements to MATE algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
Probabilistic packet delay guarantee in buffered crossbar switchFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
A game theory based approach for security in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
A simulation study on a layered video multicast algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 265-269
A fast pattern matching algorithm for network processor-based intrusion detection systemFull-text access may be available. Sign in or learn about subscription options.pp. 271-275
Using adaptive priority scheduling for service differentiation QoS-aware Web serversFull-text access may be available. Sign in or learn about subscription options.pp. 279-285
End-to-end layered multicast of streaming media in heterogeneous networksFull-text access may be available. Sign in or learn about subscription options.pp. 287-292
Differentiated caching of dynamic content using effective page classificationFull-text access may be available. Sign in or learn about subscription options.pp. 293-298
Differentiated-service enabled group communications using bandwidth brokersFull-text access may be available. Sign in or learn about subscription options.pp. 299-304
On the reliability of ODMRP in mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 307-308
An adaptive algorithm for estimating wireless communication channelFull-text access may be available. Sign in or learn about subscription options.pp. 309-310
A goal-oriented self-tuning caching algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 311-312
Coopeer: a peer-to-peer Web search engine towards collaboration, humanization and personalizationFull-text access may be available. Sign in or learn about subscription options.pp. 313-314
Queueing analysis of DCHF and token-passing protocols with varying turnaround timeFull-text access may be available. Sign in or learn about subscription options.pp. 315-316
Secure multimedia transmission in IPv6 wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 317-318
A public key algorithm for ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 319-320
Performance analysis of multi-hop wireless ad hoc networks using IEEE 802.11 DCFFull-text access may be available. Sign in or learn about subscription options.pp. 321-322
Adaptive gossip-based routing algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 323-324
Session 5.1 Ad hoc Networks IFreely available from IEEE.pp. 327-327
Stability helps quality of service routing in wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 329-336
An information dissemination protocol for an ad hoc networkFull-text access may be available. Sign in or learn about subscription options.pp. 337-345
Position-based routing with a power-aware weighted forwarding function in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 347-355
Session 5.2 Concurrent ComputingFreely available from IEEE.pp. 357-357
Flexible mechanisms for performance enhancements of cluster networksFull-text access may be available. Sign in or learn about subscription options.pp. 359-366
A distributed coordinated approach to parallel programmingFull-text access may be available. Sign in or learn about subscription options.pp. 367-374
Object allocation and memory contention study of Java multithreaded applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 375-382
Session 5.3 EWCN Wireless Sensor Networks IFreely available from IEEE.pp. 383-383
Comparative analysis of algorithms for tree structure restoration in sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 385-391
A new protocol for a low power sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 393-399
Panel IFreely available from IEEE.pp. 401-401
Session 6.1 Ad hoc Network IIFreely available from IEEE.pp. 405-405
Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 407-413
SEKEN: secure and efficient key exchange for sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 415-422
Adaptive location aided mobile ad hoc network routingFull-text access may be available. Sign in or learn about subscription options.pp. 423-432
Session 6.2 Web Architectures and ServicesFreely available from IEEE.pp. 433-433
Performance implications of different adaptation mechanisms for network content deliveryFull-text access may be available. Sign in or learn about subscription options.pp. 435-444
Meta algorithms for hierarchical Web cachesFull-text access may be available. Sign in or learn about subscription options.pp. 445-452
QoS differentiation in switching-based Web cachingFull-text access may be available. Sign in or learn about subscription options.pp. 453-460
Session 6.3 EWCN Wireless Sensor Networks IIFreely available from IEEE.pp. 461-461
Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 463-469
Relocation of gateway for enhanced timeliness in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 471-476
Energy-efficient broadcast-based event update disseminationFull-text access may be available. Sign in or learn about subscription options.pp. 477-482
Session 7.1 QoSFreely available from IEEE.pp. 485-485
A robust PI controller for improving performance in the AF-based differentiated services networkFull-text access may be available. Sign in or learn about subscription options.pp. 487-494
EPCF: a lightweight multi-priority PCF for QoS support in IEEE 802.11 wireless LANsFull-text access may be available. Sign in or learn about subscription options.pp. 495-502
QoS service routing in one-to-one and one-to-many scenarios in next-generation service-oriented networksFull-text access may be available. Sign in or learn about subscription options.pp. 503-510
Session 7.2 Internet ProtocolsFreely available from IEEE.pp. 511-511
Improving file transfers using SCTP multistreamingFull-text access may be available. Sign in or learn about subscription options.pp. 513-522
IPCC-SCTP: an enhancement to the standard SCTP to support multi-homing efficientlyFull-text access may be available. Sign in or learn about subscription options.pp. 523-530
Active queue management for Web trafficFull-text access may be available. Sign in or learn about subscription options.pp. 531-538
Session 7.3 EWCN 3G and BeyondFreely available from IEEE.pp. 539-539
Showing 100 out of 164