Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
INFCOM
INFCOM 1999
Generate Citations
Proceedings of INFOCOM'99: Conference on Computer Communications
March 21 1999 to March 25 1999
New York, NY, USA
Volume:
1
1
3
Table of Contents
Enhancing survivability of mobile Internet access using mobile IP with location registers
Full-text access may be available. Sign in or learn about subscription options.
pp. 3,4,5,6,7,8,9,10,11
by
R. Jan
,
T. Raleigh
,
D. Yang
,
Li Fung Chang
,
C. Graff
,
M. Bereschinsky
,
M. Patel
Mobile Internet telephony: mobile extensions to H.323
Full-text access may be available. Sign in or learn about subscription options.
pp. 12,13,14,15,16,17,18,19
by
Wanjiun Liao
A new mobility model and its application in the channel holding time characterization in PCS networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-27 vol.1
by
Yuguang Fang
,
I. Chlamtac
Cell identification codes for tracking mobile users
Full-text access may be available. Sign in or learn about subscription options.
pp. 28,29,30,31,32,33,34,35
by
Z. Naor
,
H. Levy
Stochastically bounded burstiness for communication networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 36,37,38,39,40,41,42
by
D. Starobinski
,
M. Sidi
Deterministic traffic specification via projections under the min-plus algebra
Full-text access may be available. Sign in or learn about subscription options.
pp. 43,44,45,46,47,48,49,50
by
Cheng-Shang Chang
Network traffic characterization using token bucket model
Full-text access may be available. Sign in or learn about subscription options.
pp. 51,52,53,54,55,56,57,58,59,60,61,62
by
Puqi Perry Tang
,
T.-Y.C. Tai
A time varying filtering theory for constrained traffic regulation and dynamic service guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 63,64,65,66,67,68,69,70
by
Cheng-Shang Chang
,
R.L. Cruz
Optimization algorithms for large self-structuring networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 71,72,73,74,75,76,77,78
by
R. Krishnan
,
R. Ramanathan
,
M. Steenstrup
Hop-by-hop routing with node-dependent topology information
Full-text access may be available. Sign in or learn about subscription options.
pp. 79,80,81,82,83,84,85,86,87
by
V. Fayet
,
D.A. Khotimsky
,
T. Przygienda
Constructing optimal IP routing tables
Full-text access may be available. Sign in or learn about subscription options.
pp. 88,89,90,91,92,93,94,95,96,97
by
R.P. Draves
,
C. King
,
S. Venkatachary
,
B.D. Zill
SUBMARINE: an architecture for IP routing over large NBMA networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 98,99,100,101,102,103,104,105,106
by
A.G. Lauck
,
C.R. Kalmanek
,
K.K. Ramakrishnan
Performance of Web proxy caching in heterogeneous bandwidth environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 107,108,109,110,111,112,113,114,115,116
by
A. Feldmann
,
R. Caceres
,
F. Douglis
,
G. Glass
,
M. Rabinovich
Cache-based compaction: a new technique for optimizing Web transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 117,118,119,120,121,122,123,124,125
by
Mun Choon Chan
,
T.Y.C. Woo
Web caching and Zipf-like distributions: evidence and implications
Full-text access may be available. Sign in or learn about subscription options.
pp. 126,127,128,129,130,131,132,133,134
by
L. Breslau
,
Pei Cao
,
Li Fan
,
G. Phillips
,
S. Shenker
Design and performance of a Web server accelerator
Full-text access may be available. Sign in or learn about subscription options.
pp. 135,136,137,138,139,140,141,142,143
by
E. Levy-Abegnoli
,
A. Iyengar
,
Junehwa Song
,
D. Dias
Dynamic partitioning: a mechanism for shared memory management
Full-text access may be available. Sign in or learn about subscription options.
pp. 144,145,146,147,148,149,150,151,152
by
S. Krishnan
,
A.K. Choudhury
,
F.M. Chiussi
Performance evaluation and dimensioning for AAL2 CLAD
Full-text access may be available. Sign in or learn about subscription options.
pp. 153,154,155,156,157,158,159,160
by
H. Saito
Automatic fault detection and recovery in real time switched Ethernet networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 161,162,163,164,165,166,167,168,169
by
S. Varadarajan
,
T. Chiueh
Approximation capability of independent wavelet models to heterogeneous network traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 170,171,172,173,174,175,176,177
by
Chuanyi Ji
,
Sheng Ma
,
Xusheng Tian
A reliable, efficient topology broadcast protocol for dynamic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 178,179,180,181,182,183,184,185,186
by
B. Bellur
,
R.G. Ogier
TDMA scheduling design of multihop packet radio networks based on latin squares
Full-text access may be available. Sign in or learn about subscription options.
pp. 187,188,189,190,191,192,193
by
Ji-Her Ju
,
V.O.K. Li
Hop-reservation multiple access (HRMA) for ad-hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 194,195,196,197,198,199,200,201
by
Zhenyu Yang
,
J.J. Garcia-Luna-Aceves
CEDAR: a core-extraction distributed ad hoc routing algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 202,203,204,205,206,207,208,209
by
P. Sinha
,
R. Sivakumar
,
V. Bharghavan
An architecture for a global Internet host distance estimation service
Full-text access may be available. Sign in or learn about subscription options.
pp. 210,211,212,213,214,215,216,217
by
P. Francis
,
S. Jamin
,
V. Paxson
,
Lixia Zhang
,
D.F. Gryniewicz
,
Yixin Jin
Origins of Internet routing instability
Full-text access may be available. Sign in or learn about subscription options.
pp. 218,219,220,221,222,223,224,225,226
by
C. Labovitz
,
G.R. Malan
,
F. Jahanian
Estimation and removal of clock skew from network delay measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 227,228,229,230,231,232,233,234
by
S.B. Moon
,
P. Skelly
,
D. Towsley
Measuring bandwidth
Full-text access may be available. Sign in or learn about subscription options.
pp. 235,236,237,238,239,240,241,242,243,244,245
by
K. Lai
,
M. Baker
Optimal partition of QoS requirements on unicast paths and multicast trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 246,247,248,249,250,251,252,253
by
D.H. Lorenz
,
A. Orda
Bandwidth allocation policies for unicast and multicast flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 254,255,256,257,258,259,260,261
by
A. Legout
,
J. Nonnenmacher
,
E.W. Biersack
Resource allocation in a multicast tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 262,263,264,265,266
by
M. Kodialam
,
S.H. Low
Optimal broadcasting of two files over an asymmetric channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 267,268,269,270,271,272,273,274
by
A. Bar-Noy
,
Y. Shilo
Accessing multiple mirror sites in parallel: using Tornado codes to speed up downloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 275,276,277,278,279,280,281,282,283
by
J.W. Byers
,
M. Luby
,
M. Mitzenmacher
Efficient algorithms for predicting requests to Web servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 284,285,286,287,288,289,290,291,292,293
by
E. Cohen
,
B. Krishnamurthy
,
J. Rexford
A scalable system for consistently caching dynamic Web data
Full-text access may be available. Sign in or learn about subscription options.
pp. 294,295,296,297,298,299,300,301,302,303
by
J. Challenger
,
A. Iyengar
,
P. Dantzig
Performance characteristics of mirror servers on the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 304,305,306,307,308,309,310,311,312
by
A. Myers
,
P. Dinda
,
Hui Zhang
Dynamic reconfiguration policies for WDM networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 313,314,315,316,317,318,319,320
by
I. Baldine
,
G.N. Rouskas
Blocking in wavelength routing networks .I. The single path case
Full-text access may be available. Sign in or learn about subscription options.
pp. 321,322,323,324,325,326,327,328
by
Yuhong Zhu
,
G.N. Rouskas
,
H.G. Perros
Computing approximate blocking probabilities in wavelength routed all-optical networks with limited-range wavelength conversion
Full-text access may be available. Sign in or learn about subscription options.
pp. 329,330,331,332,333,334,335,336
by
T. Tripathi
,
K.N. Sivarajan
Photonic rearrangeable networks with zero switching-element crosstalk
Full-text access may be available. Sign in or learn about subscription options.
pp. 337,338,339,340,341,342,343,344
by
G. Maier
,
A. Pattavina
Measurement and modelling of the temporal dependence in packet loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 345,346,347,348,349,350,351,352
by
M. Yajnik
,
Sue Moon
,
J. Kurose
,
D. Towsley
Inference of multicast routing trees and bottleneck bandwidths using end-to-end measurements
Full-text access may be available. Sign in or learn about subscription options.
pp. 353,354,355,356,357,358,359,360
by
S. Ratnasamy
,
S. McCanne
Classifying loss rates in broadband networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 361,362,363,364,365,366,367,368,369,370
by
T.X. Brown
Multicast-based inference of network-internal characteristics: accuracy of packet loss estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 371,372,373,374,375,376,377,378,379
by
R. Caceres
,
N.G. Duffield
,
J. Horowitz
,
D. Towlsey
,
T. Bu
Minimizing end-to-end delay in high-speed networks with a simple coordinated schedule
Full-text access may be available. Sign in or learn about subscription options.
pp. 380,381,382,383,384,385,386,387,388
by
M. Andrews
,
L. Zhang
Efficient fair queueing for ATM networks using uniform round robin
Full-text access may be available. Sign in or learn about subscription options.
pp. 389,390,391,392,393,394,395,396,397
by
N. Matsurfuru
,
R. Aibara
Generalised minimum queuing delay: an adaptive multi-rate service discipline for ATM networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 398,399,400,401,402,403,404
by
Hoon-Tong Ngin
,
Chen-Khong Tham
,
Wee-Seng Soh
Quality of service driven packet scheduling disciplines for real-time applications: looking beyond fairness
Full-text access may be available. Sign in or learn about subscription options.
pp. 405,406,407,408,409,410,411,412
by
D.A. Hayes
,
M. Rumsewicz
,
L.L.H. Andrew
Author index
Freely available from IEEE.
pp. 0_1-0_3
Showing 49 out of 49