Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
INFCOM
INFCOM 2002
Generate Citations
Proceedings of IEEE Information Communications Conference (INFOCOM 2002)
June 23 2002 to June 27 2002
New York, NY, USA
Volume:
1
2
3
Table of Contents
Simple models of network access, with applications to the design of joint rate and admission control
Full-text access may be available. Sign in or learn about subscription options.
pp. 3,4,5,6,7,8,9,10,11,12
by
M. Mandjes
,
D. Mitra
,
W. Scheinhardt
A robust active queue management algorithm based on sliding mode variable structure control
Full-text access may be available. Sign in or learn about subscription options.
pp. 13,14,15,16,17,18,19,20
by
Ren Fengyuan
,
Lin Chuang
,
Ying Xunhe
,
Shan Xiuming
,
Wang Fubao
Self-verifying CSFQ
Full-text access may be available. Sign in or learn about subscription options.
pp. 21,22,23,24,25,26,27,28,29,30
by
I. Stoica
,
H. Zhang
,
S. Shenker
Improving the performance of interactive TCP applications using service differentiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 31,32,33,34,35,36,37,38,39,40
by
W. Noureddine
,
F. Tobagi
An analytical framework for performance comparison of bandwidth reservation schemes in WDM ring
Full-text access may be available. Sign in or learn about subscription options.
pp. 41,42,43,44,45,46,47
by
J. Cai
,
A. Fumagalli
Virtual-topology adaptation for WDM mesh networks under dynamic traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 48,49,50,51,52,53,54,55,56
by
A. Gencata
,
B. Mukherjee
Off-line configuration of a MPLS over WDM network under time-varying offered traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 57,58,59,60,61,62,63,64,65
by
F. Ricciato
,
S. Salsano
,
A. Belmonte
,
M. Listanti
Performance analysis of deflection routing in optical burst-switched networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 66,67,68,69,70,71,72,73
by
Ching-Fang Hsu
,
Te-Lung Liu
,
Nen-Fu Huang
GPS queues with heterogeneous traffic classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 74,75,76,77,78,79,80,81,82,83
by
S. Borst
,
M. Mandjes
,
M. van Uitert
Packet scale rate guarantee for non-FIFO nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 84,85,86,87,88,89,90,91,92,93
by
J.-Y. Le Boudec
,
A. Charny
On-line admission control and packet scheduling with interleaving
Full-text access may be available. Sign in or learn about subscription options.
pp. 94,95,96,97,98,99,100,101,102,103
by
J.A. Garay
,
J.S. Naor
,
B. Yener
,
Peng Zhao
Scheduling processing resources in programmable routers
Full-text access may be available. Sign in or learn about subscription options.
pp. 104,105,106,107,108,109,110,111,112
by
P. Pappu
,
T. Wolf
Routing restorable bandwidth guaranteed connections using maximum 2-route flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 113,114,115,116,117,118,119,120,121
by
K. Kar
,
M. Kodialam
,
T.V. Lakshman
Beyond routing: an algebraic approach to network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 122,123,124,125,126,127,128,129,130
by
R. Koetter
,
M. Medard
Restoration algorithms for virtual private networks in the hose model
Full-text access may be available. Sign in or learn about subscription options.
pp. 131,132,133,134,135,136,137,138,139
by
G.F. Italiano
,
R. Rastogi
,
B. Yener
Efficient distributed path selection for shared restoration connections
Full-text access may be available. Sign in or learn about subscription options.
pp. 140,141,142,143,144,145,146,147,148,149
by
Guangzhi Li
,
Dongmei Wang
,
C. Kalmanek
,
R. Doverspike
Assessment of VoIP quality over Internet backbones
Full-text access may be available. Sign in or learn about subscription options.
pp. 150,151,152,153,154,155,156,157,158,159
by
A.P. Markopoulou
,
F.A. Tobagi
,
M.J. Karam
Clock synchronization algorithms for network measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 160,161,162,163,164,165,166,167,168,169
by
Li Zhang
,
Zhen Liu
,
C. Honghui Xia
Predicting Internet network distance with coordinates-based approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 170,171,172,173,174,175,176,177,178,179
by
T.S.E. Ng
,
Hui Zhang
Predicting TCP throughput from non-invasive network sampling
Full-text access may be available. Sign in or learn about subscription options.
pp. 180,181,182,183,184,185,186,187,188,189
by
M. Goyal
,
R. Guerin
,
R. Rajan
Energy-limited wireless networking with directional antennas: the case of session-based multicasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 190,191,192,193,194,195,196,197,198,199
by
J.E. Wieselthier
,
G.D. Nguyen
,
A. Ephremides
Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 200,201,202,203,204,205,206,207,208,209
by
Yu-Chee Tseng
,
Chih-Shun Hsu
,
Ten-Yueng Hsieh
Energy efficiency and throughput for TCP traffic in multi-hop wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 210,211,212,213,214,215,216,217,218,219
by
S. Bansal
,
R. Gupta
,
R. Shorey
,
I. Ali
,
A. Razdan
,
A. Misra
Energy efficient communications in ad hoc networks using directional antennas
Full-text access may be available. Sign in or learn about subscription options.
pp. 220,221,222,223,224,225,226,227,228
by
A. Spyropoulos
,
C.S. Raghavendra
AIMD, fairness and fractal scaling of TCP traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 229,230,231,232,233,234,235,236,237,238
by
F. Baccelli
,
D. Hong
Dynamics of TCP/RED and a scalable control
Full-text access may be available. Sign in or learn about subscription options.
pp. 239,240,241,242,243,244,245,246,247,248
by
S.H. Low
,
F. Paganini
,
Jiantao Wang
,
S. Adlakha
,
J.C. Doyle
Nonlinear instabilities in TCP-RED
Full-text access may be available. Sign in or learn about subscription options.
pp. 249,250,251,252,253,254,255,256,257,258
by
P. Ranjan
,
E.H. Abed
,
R.J. La
Exact sampling of TCP window states
Full-text access may be available. Sign in or learn about subscription options.
pp. 259,260,261,262,263,264,265
by
A. Goel
,
M. Mitzenmacher
Priority service and max-min fairness
Full-text access may be available. Sign in or learn about subscription options.
pp. 266,267,268,269,270,271,272,273,274,275
by
P. Marbach
Differential join prices for parallel queues: social optimality, dynamic pricing algorithms and application to Internet pricing
Full-text access may be available. Sign in or learn about subscription options.
pp. 276,277,278,279,280,281,282,283
by
P. Dube
,
V.S. Borkar
,
D. Manjunath
How to market-manage a QoS network
Full-text access may be available. Sign in or learn about subscription options.
pp. 284,285,286,287,288,289,290,291,292,293
by
J. Altmann
,
H. Daanen
,
H. Oliver
,
A.S.-B. Suarez
Revenue-maximizing pricing and capacity expansion in a many-users regime
Full-text access may be available. Sign in or learn about subscription options.
pp. 294,295,296,297,298,299,300,301
by
T. Basar
,
R. Srikant
Distributed partial information management (DPIM) schemes for survivable networks .1
Full-text access may be available. Sign in or learn about subscription options.
pp. 302,303,304,305,306,307,308,309,310,311
by
Chunming Qiao
,
Dahai Xu
The travelling miser problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 312,313,314,315,316,317,318,319,320,321
by
D. Breitgand
,
D. Raz
,
Y. Shavitt
Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms
Full-text access may be available. Sign in or learn about subscription options.
pp. 322,323,324,325,326,327,328,329,330,331
by
M. Steinder
,
A.S. Sethi
KNITS: switch-based connection hand-off
Full-text access may be available. Sign in or learn about subscription options.
pp. 332,333,334,335,336,337,338,339,340,341
by
A.E. Papathanasiou
,
E. Van Hensbergen
Guaranteed scheduling for switches with configuration overhead
Full-text access may be available. Sign in or learn about subscription options.
pp. 342,343,344,345,346,347,348,349,350,351
by
B. Towles
,
W.J. Dally
A distributed switch architecture with dynamic load-balancing and parallel input-queued crossbars for terabit switch fabrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 352,353,354,355,356,357,358,359,360,361
by
W. Wang
,
L. Dong
,
W. Wolf
Design of wavelength converting switches for optical burst switching
Full-text access may be available. Sign in or learn about subscription options.
pp. 362,363,364,365,366,367,368,369,370
by
J. Ramamirtham
,
J. Turner
Ultrafast photonic label switch for asynchronous packets of variable length
Full-text access may be available. Sign in or learn about subscription options.
pp. 371,372,373,374,375,376,377,378,379,380
by
M. Murata
,
K. Kitayama
Spatial averages of downlink coverage characteristics in CDMA networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 381,382,383,384,385,386,387,388,389,390
by
F. Baccelli
,
B. Blaszczyszyn
,
F. Tournois
Bursty data over CDMA: MAI self similarity, rate control and admission control
Full-text access may be available. Sign in or learn about subscription options.
pp. 391,392,393,394,395,396,397,398,399
by
Junshan Zhang
,
Ming Hu
,
N.B. Shroff
Optimal MAC state switching for cdma2000 networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 400,401,402,403,404,405,406
by
M. Chatterjee
,
S.K. Das
The quantitative analysis of TCP congestion control algorithm in third-generation cellular networks based on FSMC loss model and its performance enhancement
Full-text access may be available. Sign in or learn about subscription options.
pp. 407,408,409,410,411,412,413,414,415,416
by
Fei Hu
,
N.K. Sharma
TCP network calculus: the case of large delay-bandwidth product
Full-text access may be available. Sign in or learn about subscription options.
pp. 417,418,419,420,421,422,423,424,425,426
by
E. Altman
,
K. Avrachenkov
,
C. Barakat
Packet scheduling with fragmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 427,428,429,430,431,432,433,434,435,436
by
N. Naaman
,
R. Rom
How harmful the paradox can be in the Braess/Cohen-Kelly-Jeffries networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 437,438,439,440,441,442,443,444,445
by
H. Kameda
A unified framework for understanding network traffic using independent wavelet models
Full-text access may be available. Sign in or learn about subscription options.
pp. 446,447,448,449,450,451,452,453,454
by
Xusheng Tian
,
He Wu
,
Chuanyi Ji
Author index
Freely available from IEEE.
pp. 455,456,457,458
Showing 49 out of 49