Default Cover Image

The 18th IEEE International Conference on Network Protocols

Oct. 5 2010 to Oct. 8 2010

Kyoto, Japan

ISBN: 978-1-4244-8644-1

Table of Contents

Papers
Author indexFreely available from IEEE.pp. 315-317
Papers
[Copyright notice]Freely available from IEEE.pp. 1
Papers
CommitteeFreely available from IEEE.pp. 1-4
Papers
Routing in max-min fair networks: A game theoretic approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Impairment-aware path selection and regenerator placement in translucent optical networksFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Papers
GreenTE: Power-aware traffic engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Papers
Fast routing table lookup based on deterministic multi-hashingFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Papers
Practical Virtual Coordinates for large wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 41-51
Papers
Passive interference measurement in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 52-61
Papers
ETOC: Obtaining robustness in component-based localizationFull-text access may be available. Sign in or learn about subscription options.pp. 62-71
Papers
UVOC-MAC: A MAC protocol for outdoor ultraviolet networksFull-text access may be available. Sign in or learn about subscription options.pp. 72-81
Papers
Granting silence to avoid wireless collisionsFull-text access may be available. Sign in or learn about subscription options.pp. 82-91
Papers
Network Coding aware Rate Selection in multi-rate IEEE 802.11Full-text access may be available. Sign in or learn about subscription options.pp. 92-102
Papers
Neighbor-specific BGP: An algebraic explorationFull-text access may be available. Sign in or learn about subscription options.pp. 103-112
Papers
Assigning AS relationships to satisfy the Gao-Rexford conditionsFull-text access may be available. Sign in or learn about subscription options.pp. 113-123
Papers
A new VPN routing approach for large scale networksFull-text access may be available. Sign in or learn about subscription options.pp. 124-133
Papers
TowerDefense: Deployment strategies for battling against IP prefix hijackingFull-text access may be available. Sign in or learn about subscription options.pp. 134-143
Papers
Identifying suspicious activities through DNS failure graph analysisFull-text access may be available. Sign in or learn about subscription options.pp. 144-153
Papers
Identification-free batch authentication for RFID tagsFull-text access may be available. Sign in or learn about subscription options.pp. 154-163
Papers
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimizationFull-text access may be available. Sign in or learn about subscription options.pp. 164-173
Papers
Firewall modules and modular firewallsFull-text access may be available. Sign in or learn about subscription options.pp. 174-182
Papers
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 183-192
Papers
On exploiting transient contact patterns for data forwarding in Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
Papers
RELICS: In-network realization of incentives to combat selfishness in DTNsFull-text access may be available. Sign in or learn about subscription options.pp. 203-212
Papers
Optimal cache-based route repair for real-time trafficFull-text access may be available. Sign in or learn about subscription options.pp. 213-222
Papers
CodePlay: Live multimedia streaming in VANETs using symbol-level network codingFull-text access may be available. Sign in or learn about subscription options.pp. 223-232
Papers
An opportunistic relay protocol for vehicular road-side access with fading channelsFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Papers
Exploring the hidden connectivity in urban vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 243-252
Papers
Optimal distributed P2P streaming under node degree boundsFull-text access may be available. Sign in or learn about subscription options.pp. 253-262
Papers
SocialSwarm: Exploiting distance in social networks for collaborative flash file distributionFull-text access may be available. Sign in or learn about subscription options.pp. 263-274
Papers
Peer-assisted VoD prefetching in double auction marketsFull-text access may be available. Sign in or learn about subscription options.pp. 275-284
Papers
TOP: Tail Optimization Protocol For Cellular Radio Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 285-294
Papers
Scalable video multicast with joint layer resource allocation in broadband wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 295-304
Papers
Beyond co-existence: Exploiting WiFi white space for Zigbee performance assuranceFull-text access may be available. Sign in or learn about subscription options.pp. 305-314
Papers
Message from the General Co-ChairsFreely available from IEEE.pp. 1-2
Table of contentsFreely available from IEEE.pp. 1-3
Showing 37 out of 37