Default Cover Image

10th IEEE International Conference on Network Protocols, 2002. Proceedings.

Nov. 12 2002 to Nov. 15 2002

Paris, France

Table of Contents

Introduction
Message from the General Co-ChairsFreely available from IEEE.pp. ix
Introduction
Message from the Program ChairsFreely available from IEEE.pp. x
Introduction
CommitteesFreely available from IEEE.pp. xi
Introduction
ReviewersFreely available from IEEE.pp. xiii
Session 1: TCP Wired I
Effectiveness of Loss Labeling in Improving TCP Performance in Wired/Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 2
Session 1: TCP Wired I
Half-Pipe Anchoring: An Efficient Technique for Multiple Connection HandoffFull-text access may be available. Sign in or learn about subscription options.pp. 12
Session 2: TCP Wired II
pTCP: An End-to-End Transport Layer Protocol for Striped ConnectionsFull-text access may be available. Sign in or learn about subscription options.pp. 24
Session 2: TCP Wired II
A Case for Exploiting Self-Similarity of Network Traffic in TCPFull-text access may be available. Sign in or learn about subscription options.pp. 34
Session 3: Ad Hoc/Wireless
Hybrid Channel Access Scheduling in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 46
Session 3: Ad Hoc/Wireless
Incentive Engineering in Wireless LAN Based Access NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 58
Session 3: Ad Hoc/Wireless
Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 68
Session 3: Ad Hoc/Wireless
A Secure Routing Protocol for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 78
Session 4: Routing
Analysis of the MED Oscillation Problem in BGPFull-text access may be available. Sign in or learn about subscription options.pp. 90
Session 4: Routing
QoS Extension to BGPFull-text access may be available. Sign in or learn about subscription options.pp. 100
Session 4: Routing
Routing Bandwidth Guaranteed Paths with Local Restoration in Label Switched NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 110
Session 5: Formal Methods
A Formal Approach for Passive Testing of Protocol Data PortionsFull-text access may be available. Sign in or learn about subscription options.pp. 122
Session 5: Formal Methods
Specification and Analysis of the DCF and PCF Protocols in the 802.11 Standard Using Systems of Communicating MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 132
Session 6: Potpourri
A Theory of Window-Based Unicast Congestion ControlFull-text access may be available. Sign in or learn about subscription options.pp. 144
Session 6: Potpourri
Sync-MS: Synchronized Messaging Service for Real-Time Multi-Player Distributed GamesFull-text access may be available. Sign in or learn about subscription options.pp. 155
Session 6: Potpourri
Clustering Web Content for Efficient ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 165
Session 6: Potpourri
On Efficient On-Line Grouping of Flows with Shared Bottlenecks at Loaded ServersFull-text access may be available. Sign in or learn about subscription options.pp. 175
Poster Session
XCHOKE: Malicious Source Control for Congestion Avoidance at Internet GatewaysFull-text access may be available. Sign in or learn about subscription options.pp. 186
Poster Session
Allocation of Protection Domains in Dynamic WDM Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 188
Poster Session
Optimal Stream Replication for Video SimulcastingFull-text access may be available. Sign in or learn about subscription options.pp. 190
Poster Session
Power Mode Scheduling for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 192
Poster Session
RED-Worcester — Traffic Sensitive Active Queue ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 194
Poster Session
A Multicast Transport Protocol for Cooperative Media DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 196
Poster Session
Auction or Tâtonnement - Finding Congestion Prices for Adaptive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 198
Poster Session
PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 200
Poster Session
Key Management for Heterogeneous Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 202
Session 7: Wireless TCP and Overlays
Using Adaptive Rate Estimation to Provide Enhanced and Robust Transport over Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 206
Session 7: Wireless TCP and Overlays
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 216
Session 7: Wireless TCP and Overlays
A Lightweight, Robust P2P System to Handle Flash CrowdsFull-text access may be available. Sign in or learn about subscription options.pp. 226
Session 7: Wireless TCP and Overlays
Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 236
Session 8: Multicast
A Simple and Scalable Fair Bandwidth Sharing Mechanism for Multicast FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 248
Session 8: Multicast
Dynamic Routing of Bandwidth Guaranteed Multicasts with Failure BackupFull-text access may be available. Sign in or learn about subscription options.pp. 259
Session 9: Internet
Fast and Scalable Conflict Detection for Packet ClassifiersFull-text access may be available. Sign in or learn about subscription options.pp. 270
Session 9: Internet
Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 280
Session 9: Internet
IPv4+4Full-text access may be available. Sign in or learn about subscription options.pp. 290
Session 10: Security/DOS
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 302
Session 10: Security/DOS
Attacking DDoS at the SourceFull-text access may be available. Sign in or learn about subscription options.pp. 312
Session 10: Security/DOS
Distributed Collaborative Key Agreement Protocols for Dynamic Peer GroupsFull-text access may be available. Sign in or learn about subscription options.pp. 322
Session 11: Provisioning and Resource Setup
Service Overlay Networks: SLAs, QoS and Bandwidth ProvisioningFull-text access may be available. Sign in or learn about subscription options.pp. 334
Session 11: Provisioning and Resource Setup
An Ultra-fast Shared Path Protection Scheme — Distributed Partial Information Management, Part IIFull-text access may be available. Sign in or learn about subscription options.pp. 344
Session 11: Provisioning and Resource Setup
An Investigation of Inter-Domain Control Aggregation ProceduresFull-text access may be available. Sign in or learn about subscription options.pp. 354
Author Index
Author IndexFreely available from IEEE.pp. 365
Showing 47 out of 47