default search action
GLOBECOM 2007: Washington, DC, USA
- Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. IEEE 2007
IP Networks Security
- Yang Chen, Abhishek Kumar, Jun (Jim) Xu:
A New Design of Bloom Filter for Packet Inspection Speedup. 1-5 - Patrick Truong, Fabrice Guillemin:
Dynamic Binary Tree for Hierarchical Clustering of IP Traffic. 6-10 - Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen Ho:
Performing Packet Content Inspection by Longest Prefix Matching Technology. 11-15 - Visvasuresh Victor Govindaswamy, Gergely V. Záruba, G. Balasekaran:
RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks. 16-21 - Fulvio Risso, Andrea Baldini, Flavio Bonomi:
Extending the NetPDL Language to Support Traffic Classification. 22-27 - Alessandro Amoroso:
AIDA: Responsive and Available Auctions Over the Internet. 28-32
Wireless Security - PHY and MAC
- Morten Lisborg Jørgensen, Boyan Radkov Yanakiev, Gunvor Elisabeth Kirkelund, Petar Popovski, Hiroyuki Yomo, Torben Larsen:
Shout to Secure: Physical-Layer Wireless Security with Known Interference. 33-38 - Yu Zhang, Zang Li, Wade Trappe:
Power-Modulated Challenge-Response Schemes for Verifying Location Claims. 39-43 - William Luh, Deepa Kundur:
Distributed Keyless Secret Sharing Over Noiseless Channels. 44-48 - Ming Lei, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. 49-53 - Sheng Xiao, Hossein Pishro-Nik, Weibo Gong:
Dense Parity Check Based Secrecy Sharing in Wireless Communications. 54-58 - Tong-Lee Lim, Tieyan Li:
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme. 59-63
Overlay Routing and Topology
- Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Heiko Niedermayer, Georg Carle:
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. 64-69 - Takashi Tomimoto, Takuji Tachibana, Kenji Sugimoto:
Capability-Aware ID Assignment and Message Routing Based on Skip List in Large-Scale Heterogeneous P2P Networks. 70-74 - Ling Zhou, Arunabha Sen:
Topology Design of Service Overlay Network with a Generalized Cost Model. 75-80 - John F. Buford, Alan Brown, Mario Kolberg:
Analysis of an Active Maintenance Algorithm for an O(1)-Hop Overlay. 81-86 - Srinivasan Seetharaman, Mostafa H. Ammar:
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation. 87-92 - Juwei Shi, Yao Wang, Lanzhi Gu, Lichun Li, Wenjie Lin, Yinong Li, Yang Ji, Ping Zhang:
A Hierarchical Peer-to-Peer SIP System for Heterogeneous Overlays Interworking. 93-97
Service and Applications
- John G. Klincewicz:
Assigning Telecommunications Nodes to Community of Interest Clusters. 98-102 - Haiyang Zhang, Huadong Ma:
Weighted Degree-Based Host Clustering Algorithm in Grid. 103-107 - Hiroyuki Ohnishi, Yoji Yamato, Masashi Kaneko, Takaaki Moriya, Miki Hirano, Hiroshi Sunaga:
Service Delivery Platform for Telecom-Enterprise-Internet Combined Services. 108-112 - Maitreya Natu, Adarshpal S. Sethi:
Probe Station Placement for Fault Diagnosis. 113-117 - Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, Miki Hirano:
Dataflow Generation for Service Composition to Incorporate Web and Telecommunication. 118-123 - Zawar Shah, Robert A. Malaney, Trong Nghia Dao:
An Architecture for Location Tracking Using SIP. 124-128
Power Line Communications / Intelligent Transportation Systems
- Pawel Turcza, Lukasz Zbydniewski, Tomasz P. Zielinski:
Circular Real Sine/Cosine Gabor Transform Modulator for Power Line Communication. 129-133 - Song Liu, Larry J. Greenstein:
Modeling and Interference Evaluation of Overhead Medium-Voltage Broadband Power Line (BPL) Systems. 134-139 - Lorenzo Guerrieri, Eleonora Guerrini, Daniele Veronesi, Paola Bisaglia, Gabriele Dell'Amico:
LLR-Based Bit-Loading Algorithm for the Turbo Coded HomePlug AV. 140-145 - Dario Fertonani, Giulio Colavolpe:
Theoretical Limits and Practical Detection Schemes for Channels Affected by Class-A Impulse Noise. 146-150 - Xianbo Chen, Hazem H. Refai, Xiaomin Ma:
A QuantitativeApproach to Evaluate DSRC Highway Inter-Vehicle Safety Communication. 151-155 - Xiaohua Tian, Yu Cheng, Rose Qingyang Hu, Yi Qian:
Service Oriented Architecture (SOA) for Integration of Field Bus Systems. 156-160
Cryptography and Key Management
- Jing Deng, Yunghsiang S. Han:
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks. 161-165 - Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung Chiang, Ruby B. Lee:
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. 166-171 - Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo:
ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications. 172-176 - Daniel Bichler, Guido Stromberg, Mario Huemer:
Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks. 177-181 - Tong-Lee Lim, Anantharaman Lakshminarayanan:
On the Performance of Certificate Validation Schemes Based on Pre-Computed Responses. 182-187 - Feng Bao, Robert H. Deng:
Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. 188-192
Switch and Router Designs
- HoRang Jang, Nutthanon Leelathakul, Hyong S. Kim:
Hierarchical Self-Configuration of Large-Scale Ethernet Networks. 193-197 - Hitomi Tamura, Yutaka Yahiro, Yutaka Fukuda, Kenji Kawahara, Yuji Oie:
Performance Analysis of Energy Saving Scheme with Extra Active Period for LAN Switches. 198-203 - Wladek Olesinski, Hans Eberle, Nils Gura:
OBIG: the Architecture of an Output Buffered Switch with Input Groups for Large Switches. 204-209 - Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong, Lin Cai, Nirwan Ansari:
Parallel Search Trie-Based Scheme for Fast IP Lookup. 210-214 - Lu Peng, Wencheng Lu, Lide Duan:
Power Efficient IP Lookup with Supernode Caching. 215-219 - Domenico Ficara, Stefano Giordano, Michele Pagano, Fabio Vitucci, Federico Rossi:
AMBER Sched: An Analytical Model Based Resource Scheduler for Programmable Routers. 220-224
Streaming and Measurement
- Yang Guo, Saurabh Mathur, Kumar Ramaswamy, Shengchao Yu, Bankim Patel:
PONDER: Performance Aware P2P Video-on-Demand Service. 225-230 - Yi Cui, Liang Dai, Yuan Xue:
Optimizing P2P Streaming Throughput Under Peer Churning. 231-235 - Chao Liang, Yang Guo, Yong Liu:
Hierarchically Clustered P2P Streaming System. 236-241 - John F. Buford, Angela Wang, Xiaojun Hei, Yong Liu, Keith W. Ross:
Discovery of In-Band Streaming Services in Peer-to-Peer Overlays. 242-247 - Balasubramaneyam Maniymaran, Muthucumaru Maheswaran:
Bandwidth Landmarking: A Scalable Bandwidth Prediction Mechanism for Distributed Systems. 248-252 - Eng Keong Lua, Xiaoming Zhou:
Bos: Massive Scale Network-Aware Geometric Overlay Multicast Streaming Network. 253-258
Data Storage
- Xinde Hu, B. V. K. Vijaya Kumar, Zongwang Li, Richard Barndt:
Error Floor Estimation of Long LDPC Codes on Partial Response Channels. 259-264 - Ruwan N. S. Ratnayake, Erich F. Haratsch, Gu-Yeon Wei:
A Bit-Node Centric Architecture for Low-Density Parity-Check Decoders. 265-270 - Yang Han, William E. Ryan:
Performance of a Structured IRA Code on a Perpendicular Recording Channel with Media Noise. 271-276 - Seungjune Jeon, B. V. K. Vijaya Kumar:
Error Event Analysis of Partial Response Targets for Perpendicular Magnetic Recording. 277-282 - Fan Zhang, Henry D. Pfister:
List-Message Passing Achieves Capacity on the q-ary Symmetric Channel for Large q. 283-287 - Abu Sebastian, Aggeliki Pantazi, Haralampos Pozidis:
Jitter Investigation and Performance Evaluation of a Small-Scale Probe Storage Device Prototype. 288-293
Wireless Communications and Networking
- Hiroshi Harada, Homare Murakami, Kentaro Ishizu, Stanislav A. Filin, Yoshia Saito, Ha Nguyen Tran, Goh Miyamoto, Mikio Hasegawa, Yoshitoshi Murata, Shuzo Kato:
A Software Defined Cognitive Radio System: Cognitive Wireless Cloud. 294-299 - Yao Ma, Robert Schober, Subbarayan Pasupathy:
Asymptotic Gains of Generalized Selection Combining Over Correlated Fading Channels. 300-304 - Xiaobo Long, Biplab Sikdar:
Wavelet Based Detection of Shadow Fading in Wireless Networks. 305-309 - Mohammad Reza Zahabi, Vahid Meghdadi, Jean-Pierre Cances, Amir Saemi:
Mixed Analog and Digital Matched-Filter Design for High Rate WLAN. 310-314 - Eitan Altaian, Konstantin Avrachenkov, Nicolas Bonneau, Mérouane Debbah, Rachid El Azouzi, Daniel S. Menasché:
Constrained Stochastic Games in Wireless Networks. 315-320 - Tao Chen, Hagen Woesner, Yabin Ye, Imrich Chlamtac:
WiGEE: A Hybrid Optical/Wireless Gigabit WLAN. 321-326
Intrusion Detection and Reputation Based Systems
- Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng:
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks. 327-331 - Liming Hao, Shutang Yang, Songnian Lu, Gongliang Chen:
A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology. 332-337 - Paulo F. Silva, Carlos Becker Westphall, Carla Merkle Westphall, Marcos Dias de Assunção:
Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs. 338-342 - N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jonathan Chao:
A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System. 343-348 - N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. Jonathan Chao:
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware. 349-354 - Lanier A. Watkins, Raheem A. Beyah, Cherita L. Corbett:
A Passive Approach to Rogue Access Point Detection. 355-360
Wireless Channel and Coding Techniques
- Zhu Han, Yan Lindsay Sun:
Self-Learning Cooperative Transmission - Coping with Unreliability Due to Mobility, Channel Estimation Errors, and Untrustworthy Nodes. 361-365 - Muhammad A. Assad, Mohammad Heidari, Kaveh Pahlavan:
Effects of Channel Modeling on Performance Evaluation of WiFi RFID Localization Using a Laboratory Testbed. 366-370 - Xiaoxin Wu, Juejia Zhou, Guangjie Li, May Wu:
Low Overhead CQI Feedback in Multi-Carrier Systems. 371-375 - Zafar Q. Taha, Xian Liu:
An Adaptive Coding Technique For PAPR Reduction. 376-380 - Minas Gjoka, Christina Fragouli, Pegah Sattari, Athina Markopoulou:
Loss Tomography in General Topologies with Network Coding. 381-386 - Mohammad Heidari, Ferit Ozan Akgül, Nayef A. Alsindi, Kaveh Pahlavan:
Neural Network Assisted Identification of the Absence of Direct Path in Indoor Localization. 387-392
P2P Traffic and Performance
- Guanghui He, Jennifer C. Hou, Wei-Peng Chen, Takeo Hamada:
One Size Does Not Fit All: A Detailed Analysis and Modeling of P2P Traffic. 393-398 - Marcell Perényi, András Gefferth, Trang Dinh Dang, Sándor Molnár:
Skype Traffic Identification. 399-404 - Cameron Dale, Jiangchuan Liu:
A Measurement Study of Piece Population in BitTorrent. 405-410 - Mengkun Yang, Zongming Fei:
Assigning Identifications to Nodes in Unstructured Peer-to-Peer Networks: A Novel Approach to Improving Search Efficiency. 411-415 - Yuh-Ming Chiu, Do Young Eun:
On the Performance of Download Strategies in a P2P Like Network. 416-420 - Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng, Xing Li:
Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction. 421-426
Routing, Addressing, and Multicasting
- Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu:
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks. 427-431 - Imène Chaieb, Jean-Louis Le Roux, Bernard Cousin:
LSP Setup Arrival Reordering Approach for MPLS-TE Routing. 432-437 - Tricha Anjali, Gruia Calinescu, Sanjiv Kapoor:
Approximation Algorithms For Multipath Setup. 438-442 - Chih-Chao Wen, Cheng-Shong Wu, Kim-Joan Chen:
Centralized Control and Management Architecture Design for PIM-SM Based IP/MPLS Multicast Networks. 443-447 - Stefano Giordano, Francesco Oppedisano, Gregorio Procissi, Franco Russo:
A Novel High-Speed Micro-Flows Classification Algorithm Based on Perfect Hashing and Direct Addressing. 448-452 - Fan Wu, Sheng Zhong, Jiqiang Liu:
Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. 453-457
Security Protocols
- Kulasekaran A. Sivakumar, Mahalingam Ramkumar:
An Efficient Secure Route Discovery Protocol for DSR. 458-463 - Sungchul Heo, Zeen Kim, Kwangjo Kim:
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups. 464-468 - Sherry Wang, Harold Zheng, Wenye Wang:
Efficient Security Management for Ad Hoc Networks. 469-473 - Jinu Kurian, Kamil Saraç:
Provider Provisioned Overlay Networks and Their Utility in DoS Defense. 474-479 - Xiaodong Lin, Chenxi Zhang, Xiaoting Sun, Pin-Han Ho, Xuemin Shen:
Performance Enhancement for Secure Vehicular Communications. 480-485 - Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen:
Secure Localized Authentication and Billing for Wireless Mesh Networks. 486-491
Resource Management
- Xian Liu:
Capacity Assignment for Delay Bounded Packet Traffic. 492-496 - Ismet Sahin, Marwan A. Simaan:
Flow Control in Communication Networks with Competing Teams of Cooperative Users. 497-501 - Ahmed Elmokashfi, Michael Kleis, Adrian Popescu:
NetForecast: A Delay Prediction Scheme for Provider Controlled Networks. 502-507 - Noriaki Kamiyama:
Network Topology Design Using Data Envelopment Analysis. 508-513 - Ming Lei, Susan V. Vrbsky, Yang Xiao:
A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments. 514-519 - Tuomas Tirronen, Jorma T. Virtamo:
Performance Analysis of Divided Random Linear Fountain. 520-526
General Symposium (Poster Session)
- Binbin Wu, Brian Marchant, Mohsen Kavehrad:
Dispersion Analysis of 1.55um Free-Space Optical Communications through a Heavy Fog Medium. 527-531 - Shigeo Shioda, Kazuhiro Nakamura:
Scale-Free Property of Directed Networks with Two Intrinsic Node Weights. 532-537 - Xiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu:
Secret Key Estimation for Image Sequential Steganograph in Transform Domain. 538-542 - Kun Xie, Yinghua Min, Dafang Zhang, Jigang Wen, Gaogang Xie:
A Scalable Bloom Filter for Membership Queries. 543-547 - Radivoje Zarubica, Stephen G. Wilson, Eric K. Hall:
Multi-Gbps FPGA-Based Low Density Parity Check (LDPC) Decoder Design. 548-552 - Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
XPRIDE: Policy-Driven Web Services Security Based on XML Content. 553-558 - Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Zhijia Chen:
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts. 559-564 - Shaoyu Yang, Yoo-Ah Kim, Bing Wang:
Designing Infrastructure-Based Overlay Networks for Delay-Sensitive Group Communications. 565-570 - Jiansong Chen, Xiaoli Yu, C.-C. Jay Kuo:
V-BLAST Receiver for MIMO Relay Networks with Imperfect CSI. 571-575 - Kamal Deep Singh, David Ros:
Normalized Rate Guarantee Scheduler for High Speed Downlink Packet Access. 576-580
Energy Based and Cross-Layer Routing Based Protocols
- Do Van Giang, Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. 581-585 - Yean-Fu Wen, Frank Yeong-Sung Lin, Hung-Shi Wang:
A TDMA-based Scheduling and Routing Algorithm for Data-Centric Wireless Sensor Networks. 586-591 - Abderrahim Benslimane, Cédric Ferraris, Abdelhakim Hafid:
EM2NET: An Energy-Saving Explicit Multicast Protocol for MANETs. 592-597 - Vahid Shah-Mansouri, Vincent W. S. Wong:
Distributed Maximum Lifetime Routing in Wireless Sensor Networks Based on Regularization. 598-603 - Hon Sun Chiu, Kwan Lawrence Yeung, King-Shan Lui:
On Optimization of Joint Channel Assignment and Routing in Mobile Ad Hoc Networks. 604-608 - Ju-Lan Hsu, Izhak Rubin:
Cross-Layer Multi-Rate Routing Strategies in Wireless Multi-Hop Random Access Networks. 609-613
MAC Protocols and Performance Evaluation
- David Tung Chong Wong, Francois P. S. Chin, Mangalam Ramakrishnan Shajan, Yong Huat Chew:
Saturated Throughput of PCA with Hard DRPs in the Presence of Bit Error for WiMedia MAC. 614-619 - Masanori Takata, Masaki Bandai, Takashi Watanabe:
A MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks. 620-625 - Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis:
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks. 626-630 - Kostas Stamatiou, John G. Proakis, James R. Zeidler:
Evaluation of MIMO Techniques in FH-MA Ad Hoc Networks. 631-635 - Haiming Yang, Hsin-Yi Shen, Biplab Sikdar:
A MAC Protocol for Cooperative MIMO Transmissions in Sensor Networks. 636-640
Geographic and Cooperative Based Routing Protocols
- Daisuke Takahashi, Yang Xiao, Fei Hu:
LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks. 641-645