Default Cover Image

Proceedings of IEEE Information Communications Conference (INFOCOM 2002)

June 23 2002 to June 27 2002

New York, NY, USA

Volume:

Table of Contents

Simple models of network access, with applications to the design of joint rate and admission controlFull-text access may be available. Sign in or learn about subscription options.pp. 3,4,5,6,7,8,9,10,11,12
A robust active queue management algorithm based on sliding mode variable structure controlFull-text access may be available. Sign in or learn about subscription options.pp. 13,14,15,16,17,18,19,20
Self-verifying CSFQFull-text access may be available. Sign in or learn about subscription options.pp. 21,22,23,24,25,26,27,28,29,30
Improving the performance of interactive TCP applications using service differentiationFull-text access may be available. Sign in or learn about subscription options.pp. 31,32,33,34,35,36,37,38,39,40
An analytical framework for performance comparison of bandwidth reservation schemes in WDM ringFull-text access may be available. Sign in or learn about subscription options.pp. 41,42,43,44,45,46,47
Virtual-topology adaptation for WDM mesh networks under dynamic trafficFull-text access may be available. Sign in or learn about subscription options.pp. 48,49,50,51,52,53,54,55,56
Off-line configuration of a MPLS over WDM network under time-varying offered trafficFull-text access may be available. Sign in or learn about subscription options.pp. 57,58,59,60,61,62,63,64,65
Performance analysis of deflection routing in optical burst-switched networksFull-text access may be available. Sign in or learn about subscription options.pp. 66,67,68,69,70,71,72,73
GPS queues with heterogeneous traffic classesFull-text access may be available. Sign in or learn about subscription options.pp. 74,75,76,77,78,79,80,81,82,83
Packet scale rate guarantee for non-FIFO nodesFull-text access may be available. Sign in or learn about subscription options.pp. 84,85,86,87,88,89,90,91,92,93
On-line admission control and packet scheduling with interleavingFull-text access may be available. Sign in or learn about subscription options.pp. 94,95,96,97,98,99,100,101,102,103
Scheduling processing resources in programmable routersFull-text access may be available. Sign in or learn about subscription options.pp. 104,105,106,107,108,109,110,111,112
Routing restorable bandwidth guaranteed connections using maximum 2-route flowsFull-text access may be available. Sign in or learn about subscription options.pp. 113,114,115,116,117,118,119,120,121
Beyond routing: an algebraic approach to network codingFull-text access may be available. Sign in or learn about subscription options.pp. 122,123,124,125,126,127,128,129,130
Restoration algorithms for virtual private networks in the hose modelFull-text access may be available. Sign in or learn about subscription options.pp. 131,132,133,134,135,136,137,138,139
Efficient distributed path selection for shared restoration connectionsFull-text access may be available. Sign in or learn about subscription options.pp. 140,141,142,143,144,145,146,147,148,149
Assessment of VoIP quality over Internet backbonesFull-text access may be available. Sign in or learn about subscription options.pp. 150,151,152,153,154,155,156,157,158,159
Clock synchronization algorithms for network measurementsFull-text access may be available. Sign in or learn about subscription options.pp. 160,161,162,163,164,165,166,167,168,169
Predicting Internet network distance with coordinates-based approachesFull-text access may be available. Sign in or learn about subscription options.pp. 170,171,172,173,174,175,176,177,178,179
Predicting TCP throughput from non-invasive network samplingFull-text access may be available. Sign in or learn about subscription options.pp. 180,181,182,183,184,185,186,187,188,189
Energy-limited wireless networking with directional antennas: the case of session-based multicastingFull-text access may be available. Sign in or learn about subscription options.pp. 190,191,192,193,194,195,196,197,198,199
Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 200,201,202,203,204,205,206,207,208,209
Energy efficiency and throughput for TCP traffic in multi-hop wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 210,211,212,213,214,215,216,217,218,219
Energy efficient communications in ad hoc networks using directional antennasFull-text access may be available. Sign in or learn about subscription options.pp. 220,221,222,223,224,225,226,227,228
AIMD, fairness and fractal scaling of TCP trafficFull-text access may be available. Sign in or learn about subscription options.pp. 229,230,231,232,233,234,235,236,237,238
Dynamics of TCP/RED and a scalable controlFull-text access may be available. Sign in or learn about subscription options.pp. 239,240,241,242,243,244,245,246,247,248
Nonlinear instabilities in TCP-REDFull-text access may be available. Sign in or learn about subscription options.pp. 249,250,251,252,253,254,255,256,257,258
Exact sampling of TCP window statesFull-text access may be available. Sign in or learn about subscription options.pp. 259,260,261,262,263,264,265
Priority service and max-min fairnessFull-text access may be available. Sign in or learn about subscription options.pp. 266,267,268,269,270,271,272,273,274,275
Differential join prices for parallel queues: social optimality, dynamic pricing algorithms and application to Internet pricingFull-text access may be available. Sign in or learn about subscription options.pp. 276,277,278,279,280,281,282,283
How to market-manage a QoS networkFull-text access may be available. Sign in or learn about subscription options.pp. 284,285,286,287,288,289,290,291,292,293
Revenue-maximizing pricing and capacity expansion in a many-users regimeFull-text access may be available. Sign in or learn about subscription options.pp. 294,295,296,297,298,299,300,301
Distributed partial information management (DPIM) schemes for survivable networks .1Full-text access may be available. Sign in or learn about subscription options.pp. 302,303,304,305,306,307,308,309,310,311
The travelling miser problemFull-text access may be available. Sign in or learn about subscription options.pp. 312,313,314,315,316,317,318,319,320,321
Increasing robustness of fault localization through analysis of lost, spurious, and positive symptomsFull-text access may be available. Sign in or learn about subscription options.pp. 322,323,324,325,326,327,328,329,330,331
KNITS: switch-based connection hand-offFull-text access may be available. Sign in or learn about subscription options.pp. 332,333,334,335,336,337,338,339,340,341
Guaranteed scheduling for switches with configuration overheadFull-text access may be available. Sign in or learn about subscription options.pp. 342,343,344,345,346,347,348,349,350,351
A distributed switch architecture with dynamic load-balancing and parallel input-queued crossbars for terabit switch fabricsFull-text access may be available. Sign in or learn about subscription options.pp. 352,353,354,355,356,357,358,359,360,361
Design of wavelength converting switches for optical burst switchingFull-text access may be available. Sign in or learn about subscription options.pp. 362,363,364,365,366,367,368,369,370
Ultrafast photonic label switch for asynchronous packets of variable lengthFull-text access may be available. Sign in or learn about subscription options.pp. 371,372,373,374,375,376,377,378,379,380
Spatial averages of downlink coverage characteristics in CDMA networksFull-text access may be available. Sign in or learn about subscription options.pp. 381,382,383,384,385,386,387,388,389,390
Bursty data over CDMA: MAI self similarity, rate control and admission controlFull-text access may be available. Sign in or learn about subscription options.pp. 391,392,393,394,395,396,397,398,399
Optimal MAC state switching for cdma2000 networksFull-text access may be available. Sign in or learn about subscription options.pp. 400,401,402,403,404,405,406
The quantitative analysis of TCP congestion control algorithm in third-generation cellular networks based on FSMC loss model and its performance enhancementFull-text access may be available. Sign in or learn about subscription options.pp. 407,408,409,410,411,412,413,414,415,416
TCP network calculus: the case of large delay-bandwidth productFull-text access may be available. Sign in or learn about subscription options.pp. 417,418,419,420,421,422,423,424,425,426
Packet scheduling with fragmentationFull-text access may be available. Sign in or learn about subscription options.pp. 427,428,429,430,431,432,433,434,435,436
How harmful the paradox can be in the Braess/Cohen-Kelly-Jeffries networksFull-text access may be available. Sign in or learn about subscription options.pp. 437,438,439,440,441,442,443,444,445
A unified framework for understanding network traffic using independent wavelet modelsFull-text access may be available. Sign in or learn about subscription options.pp. 446,447,448,449,450,451,452,453,454
Author indexFreely available from IEEE.pp. 455,456,457,458
Showing 49 out of 49