Default Cover Image

Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004.

Oct. 5 2004 to Oct. 8 2004

Berlin, Germany

ISSN: 1092-1648

ISBN: 0-7695-2161-4

Table of Contents

Implementation and evaluation of the cross-application signaling protocol (CASP)Full-text access may be available. Sign in or learn about subscription options.pp. 61-71
Session I: Routing I
The Power of Tuning: A Novel Approach for the Efficient Design of Survivable NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 2-11
Session I: Routing I
On Self Adaptive Routing in Dynamic Environments - An Evaluation and Design Using a Simple, Probabilistic SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 12-23
Session I: Routing I
Off-Piste QoS-aware Routing ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 24-35
Session I: Routing I
Trail Blazer: A Routing Algorithm Inspired by AntsFull-text access may be available. Sign in or learn about subscription options.pp. 36-47
Session II: Protocols
On the Robustness of Soft State ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 50-60
Session II: Protocols
Implementation and Evaluation of the Implementation and Evaluation of theFull-text access may be available. Sign in or learn about subscription options.pp. 61-71
Session II: Protocols
A Typed Model for Encoding-Based Protocol InteroperabilityFull-text access may be available. Sign in or learn about subscription options.pp. 72-83
Session II: Protocols
Robustness of Class-Based Path-Vector SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 84-93
Session III: Congestion Control
A Performance vs. Trust Perspective in the Design of End-Point Congestion Control ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 96-107
Session III: Congestion Control
Congestion Control in Resilient Packet RingsFull-text access may be available. Sign in or learn about subscription options.pp. 108-117
Session III: Congestion Control
Differential Congestion Notification: Taming the ElephantsFull-text access may be available. Sign in or learn about subscription options.pp. 118-128
Session III: Congestion Control
MPAT: Aggregate TCP Congestion Management as a Building Block for Internet QoSFull-text access may be available. Sign in or learn about subscription options.pp. 129-138
Session IV: Routing II
On-Demand Loop-Free Routing with Link VectorsFull-text access may be available. Sign in or learn about subscription options.pp. 140-150
Session IV: Routing II
Minimum Energy Multicast Routing for Wireless Ad-hoc Networks with Adaptive AntennasFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Session IV: Routing II
GPER: Geographic Power Efficient Routing in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 161-172
Session V: Security
Gigabit Rate Packet Pattern-Matching Using TCAMFull-text access may be available. Sign in or learn about subscription options.pp. 174-183
Session V: Security
Exploiting the Transients of Adaptation for RoQ Attacks on Internet ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 184-195
Session V: Security
Defending Against Low-Rate TCP Attacks: Dynamic Detection and ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 196-205
Session V: Security
Key Infection: Smart Trust for Smart DustFull-text access may be available. Sign in or learn about subscription options.pp. 206-215
Session VI: P2P and Overlay Networks
Trading Resiliency for Security: Model and AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 218-227
Session VI: P2P and Overlay Networks
Semantic Small World: An Overlay Network for Peer-to-Peer SearchFull-text access may be available. Sign in or learn about subscription options.pp. 228-238
Session VI: P2P and Overlay Networks
An Adaptive Protocol for Efficient Support of Range Queries in DHT-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 239-250
Session VIII: Wireless Networks
Sniffing Out the Correct Physical Layer Capture Model in 802.11bFull-text access may be available. Sign in or learn about subscription options.pp. 252-261
Session VIII: Wireless Networks
SDJS: Efficient Statistics in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 262-270
Session VIII: Wireless Networks
Optimizing the Placement of Internet TAPs in Wireless Neighborhood NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 271-282
Session VIII: Wireless Networks
Deafness: A MAC Problem in Ad Hoc Networks when using Directional AntennasFull-text access may be available. Sign in or learn about subscription options.pp. 283-292
Session IX: Performance Evaluation
Comparing the Structure of Power-Law Graphs and the Internet AS GraphFull-text access may be available. Sign in or learn about subscription options.pp. 294-303
Session IX: Performance Evaluation
Exploring the Performance Benefits of End-to-End Path SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 304-315
Session IX: Performance Evaluation
Packet-Pair Bandwidth Estimation: Stochastic Analysis of a Single Congested NodeFull-text access may be available. Sign in or learn about subscription options.pp. 316-325
Session X: Network Management
Ethernet Topology Discovery without Network AssistanceFull-text access may be available. Sign in or learn about subscription options.pp. 328-339
Session X: Network Management
Real-Time Detection of Hidden Traffic PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 340-349
Session X: Network Management
Design and Analysis of a Leader Election Algorithm for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 350-360
Session X: Network Management
A Feasibility Study for Power Management in LAN SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 361-371
Showing 35 out of 35