Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PCCC
PCCC 2004
Generate Citations
Conference Proceedings of the 2004 IEEE International Performance, Computing, and Communications Conference
April 15 2004 to April 17 2004
Phoenix, AZ, USA
Table of Contents
Conference Proceedings of the 2004 IEEE International Performance, Computing, and Communications Conference
Freely available from IEEE.
pp. i-i
IPCCC 2004 Executive Committee
Freely available from IEEE.
pp. v-v
IPCCC 2004 Technical Program Committee
Freely available from IEEE.
pp. vi-vi
Workshop on energy-efficient wireless communications and networks (EWCN) 2004
Freely available from IEEE.
pp. vii-vii
Workshop on end-to-end service differentiation (EESD) 2004
Freely available from IEEE.
pp. viii-viii
Workshop on information assurance (WIA) 2004
Freely available from IEEE.
pp. viii-viii
International Workshop on Middleware Performance (IWMP) 2004
Freely available from IEEE.
pp. ix-ix
Workshop on multihop wireless networks (MWN) 2004
Freely available from IEEE.
pp. ix-x
Panel I: Wireless networking: interoperability and security challenges
Freely available from IEEE.
pp. x-x
by
A. Durresi
Panel II: PKI to the masses
Freely available from IEEE.
pp. x-xi
by
P. Dasgupta
Session 1.1 Multicast
Freely available from IEEE.
pp. 3-3
Improving server broadcast efficiency through better utilization of client receiving bandwidth
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-12
by
A. Natarajan
,
Ying Cai
,
J. Wong
A buffer management scheme for tree-based reliable multicast using infrequent acknowledgments
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-20
by
J. Baek
,
J.-F. Paris
Selection algorithms for anycast relay routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-27
by
Jianping Zheng
,
Keqin Li
,
Zhimei Wu
Session 1.2 Network Planning
Freely available from IEEE.
pp. 29-29
Aggressive telecommunications overbooking ratios
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-38
by
R. Ball
,
M. Clement
,
Feng Huang
,
Q. Snell
,
C. Deccio
Settlement and capacity planning in multi-service provider infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-48
by
L. Amini
,
A. Paleologo
,
O. Verscheure
Algebraic geometric code based IP traceback
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-56
by
Chunyan Bai
,
Guiliang Feng
,
Gesan Wang
Session 2.1 Wireless Resource Management
Freely available from IEEE.
pp. 59-59
Connection-level performance analysis for adaptive bandwidth allocation in multimedia wireless cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
N. Nasser
,
H. Hassanein
Adaptive channel switching for admission control with QoS and priority in WCDMA uplink
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-76
by
B. Cao
,
T.A. Dahlberg
A novel velocity-dependent directional probability function based call admission control scheme in wireless multimedia communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-83
by
M.M. Islam
,
M. Murshed
,
L.S. Dooley
Session 2.2 Network Management
Freely available from IEEE.
pp. 85-85
Toward efficient distributed network monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-94
by
Xiaojiang Du
Admission control in deadline-based network resource management
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-102
by
Y.E. Liu
,
J.W. Wong
On the performance of Maestro2 high performance network equipment, using new improvement techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-110
by
S. Yamagiwa
,
K. Ferreira
,
L.M. Campos
,
K. Aoki
,
M. Ono
,
K. Wada
,
M. Fukuda
,
L. Sousa
Session 3.1 Routing
Freely available from IEEE.
pp. 113-113
Survivable multipath routing using link penalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-122
by
Dong-won Shin
,
E.K.P. Chong
,
H.J. Siegel
Benchmarks for IP forwarding tables
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-130
by
M. Castelino
,
R. Gunturi
,
V. Filauro
,
G. Vlantis
,
M. Campmas
,
A. Coppola
Damping BGP route flaps
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-138
by
Zhenhai Duan
,
J. Chandrashekar
,
J. Krasky
,
Kuai Xu
,
Zhi-Li Zhang
Session 3.2 Short Papers I
Freely available from IEEE.
pp. 139-139
Channel state dependent robust TCP/IP header compression for 3G wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-145
by
Yichuan Wu
,
Limin Sun
,
Jianping Zheng
,
Kui Huang
,
Yong Liao
Interplay of service differentiation and routing mechanisms in MANETs: a performance study
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-151
by
K.N. Sridhar
,
L. Jacob
Framework for performance analysis of channel-aware wireless schedulers
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-157
by
R. Rom
,
H.P. Tan
An efficient method for computing the bit error probabilities of band-limited asynchronous DS-CDMA systems with random signature sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
Jen-Shiun Chen
Predicting node location in a PCS network
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
W. Navidi
,
T. Camp
A cluster based secure routing scheme for wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-175
by
R. Poosarla
,
Hongmei Deng
,
A. Ojha
,
D.P. Agrawal
Session 3.3 EESD General Service Differentiation
Freely available from IEEE.
pp. 177-177
CGRED: class guided random early discarding
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-185
by
Yuchun Guo
,
Yongxiang Zhao
,
Guangnong Song
,
Xinyu Xing
,
Changjia Chen
Capacity provisioning in DiffServ/MPLS networks based on correlated traffic inputs
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-193
by
I. Atov
,
R.J. Harris
SONAR: a platform for flexible DiffServ/MPLS traffic engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-201
by
S. Van den Berghe
,
F. De Turck
,
P. Demeester
Session 4.1 Bandwidth Management
Freely available from IEEE.
pp. 205-205
Available bandwidth measurement using Poisson probing on the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Xiaojun Hei
,
D.H.K. Tsang
,
B. Bensaou
Optimization of the bandwidth distribution scheme for handling topology changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-222
by
V. Hnatyshin
,
A.S. Sethi
Statistical bounds on the drop probability of assured forwarding services in DiffServ interior nodes under the processor sharing scheduling discipline
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
B. Bensaou
,
Shixin Zhuang
,
Xiren Cao
Compositional layered performance modeling of peer-to-peer routing software
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-238
by
Pengfei Wu
,
M. Woodside
,
Chung-Horng Lung
Session 4.2 Short Papers II
Freely available from IEEE.
pp. 239-239
A performance analysis of the sockets direct protocol (SDP) with asynchronous I/O over 4X InfiniBand
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
A. Cohen
Analysis and improvements to MATE algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
M. Griot
,
G. Tucci
,
P. Belzarena
,
S. Remersaro
Probabilistic packet delay guarantee in buffered crossbar switch
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Q. Duan
,
J.N. Daigle
A game theory based approach for security in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
A. Agah
,
S.K. Das
,
K. Basu
A simulation study on a layered video multicast algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-269
by
N.K. Chilamkurti
,
B. Soh
A fast pattern matching algorithm for network processor-based intrusion detection system
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-275
by
Rong-Tai Liu
,
Nen-Fu Huang
,
Chia-Nan Kao
,
Chih-Hao Chen
Session 4.3 EESD Application and Traffic Specific Service Differentiation
Freely available from IEEE.
pp. 277-277
Using adaptive priority scheduling for service differentiation QoS-aware Web servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
M.M. Teixeira
,
M.J. Santana
,
R.H.C. Santana
End-to-end layered multicast of streaming media in heterogeneous networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
C. Nagaraj
,
M. Nguyen
,
L. Pezeshkmehr
,
M. Moh
Differentiated caching of dynamic content using effective page classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-298
by
Wenzhong Chen
,
P. Martin
,
H. Hassanein
Differentiated-service enabled group communications using bandwidth brokers
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-304
by
M. Goel
,
M. Moh
,
T. Hasegawa
,
S. Ano
On the reliability of ODMRP in mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-308
by
A. Sobeih
,
H. Baraka
,
A. Fahmy
An adaptive algorithm for estimating wireless communication channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-310
by
Peng Renbin
,
Feng Dazheng
,
Jin Lijun
A goal-oriented self-tuning caching algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-312
by
G. Santhanakrishnan
,
A. Amer
,
P.K. Chrysanthis
Coopeer: a peer-to-peer Web search engine towards collaboration, humanization and personalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-314
by
Jin Zhou
,
Kai Li
,
Li Tang
Queueing analysis of DCHF and token-passing protocols with varying turnaround time
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-316
by
M. Balakrishnan
,
E.E. Johnson
Secure multimedia transmission in IPv6 wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-318
by
Haeyong Kim
,
Yongho Seok
,
Yanghee Choi
A public key algorithm for ad-hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-320
by
B. Carbunar
,
A. Grama
,
J. Vitek
Performance analysis of multi-hop wireless ad hoc networks using IEEE 802.11 DCF
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-322
by
Yue Fang
,
A.B. McDonald
Adaptive gossip-based routing algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-324
by
Zhongmin Shi
,
Hong Shen
Session 5.1 Ad hoc Networks I
Freely available from IEEE.
pp. 327-327
Stability helps quality of service routing in wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-336
by
J.N. Al-Karaki
,
A.E. Kamal
An information dissemination protocol for an ad hoc network
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-345
by
Xia Jiang
,
T. Camp
Position-based routing with a power-aware weighted forwarding function in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-355
by
Jinhui Shen
,
J. Harms
Session 5.2 Concurrent Computing
Freely available from IEEE.
pp. 357-357
Flexible mechanisms for performance enhancements of cluster networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-366
by
N. Mohamed
,
J. Al-Jaroodi
,
Hong Jiang
A distributed coordinated approach to parallel programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-374
by
Chia-Chu Chiang
Object allocation and memory contention study of Java multithreaded applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-382
by
Wei Huang
,
Yang Qian
,
W. Srisa-an
,
J.M. Chang
Session 5.3 EWCN Wireless Sensor Networks I
Freely available from IEEE.
pp. 383-383
Comparative analysis of algorithms for tree structure restoration in sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-391
by
Fan Bai
,
A. Helmy
A new protocol for a low power sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-399
by
M. Neugebauer
,
K. Kabitzsch
Panel I
Freely available from IEEE.
pp. 401-401
Session 6.1 Ad hoc Network II
Freely available from IEEE.
pp. 405-405
Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-413
by
A.H. Altalhi
,
G.G. Richard
SEKEN: secure and efficient key exchange for sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-422
by
K. Jamshaid
,
L. Schwiebert
Adaptive location aided mobile ad hoc network routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-432
by
J. Boleng
,
T. Camp
Session 6.2 Web Architectures and Services
Freely available from IEEE.
pp. 433-433
Performance implications of different adaptation mechanisms for network content delivery
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-444
by
Xiaodong Fu
,
V. Karamcheti
Meta algorithms for hierarchical Web caches
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-452
by
N. Laoutaris
,
S. Syntila
,
I. Stavrakakis
QoS differentiation in switching-based Web caching
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-460
by
Jian Zhou
,
P. Martin
,
H. Hassanein
Session 6.3 EWCN Wireless Sensor Networks II
Freely available from IEEE.
pp. 461-461
Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-469
by
S. Tanachaiwiwat
,
P. Dave
,
R. Bhindwale
,
A. Helmy
Relocation of gateway for enhanced timeliness in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
K. Akkaya
,
M. Younis
Energy-efficient broadcast-based event update dissemination
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-482
by
O.E. Demir
,
D. Aksoy
Session 7.1 QoS
Freely available from IEEE.
pp. 485-485
A robust PI controller for improving performance in the AF-based differentiated services network
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-494
by
XiaoLin Chang
,
J.K. Muppala
EPCF: a lightweight multi-priority PCF for QoS support in IEEE 802.11 wireless LANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-502
by
J.N. Al-Karaki
,
J.M. Chang
QoS service routing in one-to-one and one-to-many scenarios in next-generation service-oriented networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-510
by
Jingwen Jin
,
K. Nahrstedt
Session 7.2 Internet Protocols
Freely available from IEEE.
pp. 511-511
Improving file transfers using SCTP multistreaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-522
by
S. Ladha
,
P.D. Amer
IPCC-SCTP: an enhancement to the standard SCTP to support multi-homing efficiently
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-530
by
Guanhua Ye
,
T.N. Saadawi
,
Myung Lee
Active queue management for Web traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-538
by
M. Claypool
,
R. Kinicki
,
M. Hartling
Session 7.3 EWCN 3G and Beyond
Freely available from IEEE.
pp. 539-539
Showing 100 out of 164
Load More
Load All