Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICNP
ICNP 2010
Generate Citations
The 18th IEEE International Conference on Network Protocols
Oct. 5 2010 to Oct. 8 2010
Kyoto, Japan
ISBN: 978-1-4244-8644-1
Table of Contents
Papers
Author index
Freely available from IEEE.
pp. 315-317
Papers
[Copyright notice]
Freely available from IEEE.
pp. 1
Papers
Committee
Freely available from IEEE.
pp. 1-4
Papers
Routing in max-min fair networks: A game theoretic approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Dejun Yang
,
Guoliang Xue
,
Xi Fang
,
Satyajayant Misra
,
Jin Zhang
Papers
Impairment-aware path selection and regenerator placement in translucent optical networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Fernando Kuipers
,
Anteneh Beshir
,
Ariel Orda
,
Piet Van Mieghem
Papers
GreenTE: Power-aware traffic engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Mingui Zhang
,
Cheng Yi
,
Bin Liu
,
Beichuan Zhang
Papers
Fast routing table lookup based on deterministic multi-hashing
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Zhuo Huang
,
David Lin
,
Jih-Kwon Peir
,
Shigang Chen
,
S. M. Iftekharul Alam
Papers
Practical Virtual Coordinates for large wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-51
by
Jiangwei Zhou
,
Yu Chen
,
Ben Leong
,
Boqin Feng
Papers
Passive interference measurement in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-61
by
Shucheng Liu
,
Guoliang Xing
,
Hongwei Zhang
,
Jianping Wang
,
Jun Huang
,
Mo Sha
,
Liusheng Huang
Papers
ETOC: Obtaining robustness in component-based localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-71
by
Xiaoping Wang
,
Yunhao Liu
,
Zheng Yang
,
Junliang Liu
,
Jun Luo
Papers
UVOC-MAC: A MAC protocol for outdoor ultraviolet networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-81
by
Yiyang Li
,
Jianxia Ning
,
Zhengyuan Xu
,
Srikanth V. Krishnamurthy
,
Gang Chen
Papers
Granting silence to avoid wireless collisions
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-91
by
Jung Il Choi
,
Mayank Jain
,
Maria A. Kazandjieva
,
Philip Levis
Papers
Network Coding aware Rate Selection in multi-rate IEEE 802.11
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-102
by
Raju Kumar
,
Srikar Tati
,
Felipe de Mello
,
Srikanth V. Krishnamurthy
,
Thomas La Porta
Papers
Neighbor-specific BGP: An algebraic exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-112
by
Alexander J. T. Gurney
,
Timothy G. Griffin
Papers
Assigning AS relationships to satisfy the Gao-Rexford conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-123
by
Luca Cittadini
,
Giuseppe Di Battista
,
Thomas Erlebach
,
Maurizio Patrignani
,
Massimo Rimondini
Papers
A new VPN routing approach for large scale networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-133
by
Zied Ben Houidi
,
Mickael Meulle
Papers
TowerDefense: Deployment strategies for battling against IP prefix hijacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-143
by
Tongqing Qiu
,
Lusheng Ji
,
Dan Pei
,
Jia Wang
,
Jun Xu
Papers
Identifying suspicious activities through DNS failure graph analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-153
by
Nan Jiang
,
Jin Cao
,
Yu Jin
,
Li Erran Li
,
Zhi-Li Zhang
Papers
Identification-free batch authentication for RFID tags
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-163
by
Lei Yang
,
Jinsong Han
,
Yong Qi
,
Yunhao Liu
Papers
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-173
by
Yating Hsu
,
David Lee
Papers
Firewall modules and modular firewalls
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-182
by
H. B. Acharya
,
Aditya Joshi
,
M. G. Gouda
Papers
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-192
by
Youngtae Noh
,
Paul Wang
,
Uichin Lee
,
Dustin Torres
,
Mario Gerla
Papers
On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-202
by
Wei Gao
,
Guohong Cao
Papers
RELICS: In-network realization of incentives to combat selfishness in DTNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-212
by
Md Yusuf Sarwar Uddin
,
Brighten Godfrey
,
Tarek Abdelzaher
Papers
Optimal cache-based route repair for real-time traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-222
by
Chuan Han
,
Yaling Yang
,
Yongxiang Peng
Papers
CodePlay: Live multimedia streaming in VANETs using symbol-level network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-232
by
Zhenyu Yang
,
Ming Li
,
Wenjing Lou
Papers
An opportunistic relay protocol for vehicular road-side access with fading channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-242
by
Joon Yoo
,
Brian Sung Chul Choi
,
Mario Gerla
Papers
Exploring the hidden connectivity in urban vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-252
by
Kebin Liu
,
Mo Li
,
Yunhao Liu
,
Xiang-Yang Li
,
Minglu Li
,
Huadong Ma
Papers
Optimal distributed P2P streaming under node degree bounds
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-262
by
Shaoquan Zhang
,
Ziyu Shao
,
Minghua Chen
Papers
SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-274
by
Matthew J. Probst
,
Jun Cheol Park
,
Ravin Abraham
,
Sneha Kumar Kasera
Papers
Peer-assisted VoD prefetching in double auction markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-284
by
Yuan Feng
,
Baochun Li
,
Bo Li
Papers
TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-294
by
Feng Qian
,
Zhaoguang Wang
,
Alexandre Gerber
,
Z. Morley Mao
,
Subhabrata Sen
,
Oliver Spatscheck
Papers
Scalable video multicast with joint layer resource allocation in broadband wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-304
by
Peilong Li
,
Honghai Zhang
,
Baohua Zhao
,
Sampath Rangarajan
Papers
Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-314
by
Jun Huang
,
Guoliang Xing
,
Gang Zhou
,
Ruogu Zhou
Papers
Message from the General Co-Chairs
Freely available from IEEE.
pp. 1-2
by
Teruo Higashino
,
Kenji Suzuki
Papers
Message from the technical program committee chairs
Freely available from IEEE.
pp. 1-2
by
Sonia Fahmy
,
Toru Hasegawa
Table of contents
Freely available from IEEE.
pp. 1-3
Showing 37 out of 37