![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
6. ICN 2007: Sainte-Luce, Martinique, France
- Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France. IEEE Computer Society 2007, ISBN 978-0-7695-2805-2
Wireless I
- Bartosz Wietrzyk, Milena Radenkovic
:
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals. 1 - Reza Shokri, Maysam Yabandeh, Nasser Yazdani:
Anonymous Routing in MANET Using Random Identifiers. 2 - Tibor Gyires:
Traffic Engineering in Fourth Generation Wireless Networks. 3 - Md. Junayed Islam, Muhidul Islam
, Nazrul Islam
:
A-sLEACH: An Advanced Solar Aware Leach Protocol for Energy Efficient Routing in Wireless Sensor Networks. 4 - Zhiwei Zhao, Xinming Zhang
, Peng Sun, Pengxi Liu:
A Transmission Power Control MAC Protocol for Wireless Sensor Networks. 5 - Wei Yang, Yang Wei:
On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel. 6
Wireless II
- Weiwei Fang, Yi Liu, Depei Qian:
EDDS: An Efficient Data Delivery Scheme for Address-Free Wireless Sensor Networks. 7 - Dong Shi, Xinming Zhang
, Xuemei Gao, Wenbo Zhu, Fengfu Zou:
A Link Reliability-Aware Route Maintenance Mechanism for Mobile Ad Hoc Networks. 8 - Pengxi Liu, Xinming Zhang
, Shuang Tian, Zhiwei Zhao, Peng Sun:
A Novel Virtual Anchor Node-Based Localization Algorithm for Wireless Sensor Networks. 9 - Paul Barom Jeon, George Kesidis:
GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. 10 - Norbert Jordan, Alexander Poropatich, Peter Reichl:
Simulative Considerations for Future 4G Hierarchical Mobility Management in All-IP Networks. 11 - Bing Liu, Lin Zhang, Huimin Zhang:
An Adaptive Schedule Medium Access Control for Wireless Sensor Networks. 12
Wireless III
- Wei Yang, Ying Huang:
Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System. 13 - Robert Bestak
:
Influence of Release Timer on MAC-hs Performance. 14 - Gugulothu Narsimha
, A. Venugopal Reddy, S. S. V. N. Sarma:
The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network. 15 - Sandhya Khurana
, Neelima Gupta, Nagender Aneja
:
Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET). 16 - Pavel Mach
, Robert Bestak
:
WiMAX Performance Evaluation. 17 - Ahmed M. Mahdy, Jitender S. Deogun, Jun Wang
:
A Dynamic Approach for the Selection of Super Peers in Ad Hoc Networks. 18
Wireless IV
- Matthias R. Brust
, Steffen Rothkugel:
Localized Support for Injection Point Election in Hybrid Networks. 19 - Leila Boukhalfa, Pascale Minet, Serge Midonnet:
QoS Support in a MANET Based on OLSR and CBQ. 20 - Dewan Tanvir Ahmed, Shervin Shirmohammadi
:
Architectural Analysis of Multicast Routing Protocols for Wireless Ad Hoc Networks. 21 - Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris:
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks. 22 - Xiang Yu, Xinming Zhang
, Can Que, Qiong Liu:
A Practical Low Interference Topology Control for Mobile Ad Hoc Networks. 23
Wireless V
- Trishla Sutaria, Imad Mahgoub
, Ali Humos, Ahmed Badi:
Implementation of an Energy Model for JiST/SWANS Wireless Network Simulator. 24 - Matthias R. Brust
, Steffen Rothkugel:
A Taxonomic Approach to Topology Control in Ad Hoc and Wireless Networks. 25 - Dewan Tanvir Ahmed, Shervin Shirmohammadi
:
Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks. 26 - Hung-Cuong Le, Hervé Guyennet, Noureddine Zerhouni:
A New Contention Access Method for Collision Avoidance in Wireless Sensor Networks. 27 - Zhiming Zhang, Weirong Jiang
, Yibo Xue:
A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. 28
P2P
- Seung Chul Han, Ye Xia:
Optimal Leader Election Scheme for Peer-to-Peer Applications. 29 - Huanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang:
Tourist: Self-Adaptive Structured Overlay. 30 - Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han:
Active Peer to Peer. 31 - Om Vikas, Nitin J. Chiluka, Purushottam K. Ray, Girraj Meena, Akhil K. Meshram, Amit Gupta, Abhishek Sisodia:
WebMiner--Anatomy of Super Peer Based Incremental Topic-Specific Web Crawler. 32 - Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhiro Matsuda:
Ring-Based Virtual Private Network Supporting a Large Number of VPNs. 33
QoS/Reliability I
- Tomoyoshi Fukuta, Hiroshi Masuyama, Toshihiko Sasama:
Hierarchical System-Level Diagnosis Based on a Voting Scheme for Identical-Unit-Interconnection Systems. 34 - Andrew P. Snow, Gary R. Weckman:
What Are the Chances an Availability SLA will be Violated? 35 - Linhua Zhong, Jin Xu, Xianlei Wang:
VWQGRR: A Novel Packet Scheduler. 36 - Alex Vallejo
, Agustín Zaballos
, Jaume Abella, Josep M. Selga, Carles Duz:
Performance of a Policy-Based Management System in IPv6 Networks Using COPS-PR. 37 - Anna Shklyaeva, David Kubánek
, Vit Novotny:
Analysis of IEEE 802.11e for Delay Sensitive Traffic in Wireless LANs. 38
QoS/Reliability II
- Sandrine Duflos, Brigitte Kervella, Valérie Gay
:
Considering Security and Quality of Service in SLS to Improve Policy-Based Management of Multimedia Services. 39 - Mostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi:
Improving Network's Performability Using Parallel Processing. 40 - Yoshinori Kitatsuji, Satoshi Katsuno, Masato Tsuru, Tetsuya Takine, Yuji Oie:
Traffic Characteristics-Based Flow Assignment Method for Reducing Queuing Delay. 41 - M. Shamim Hossain, Abdulmotaleb El-Saddik
:
Proxy-Based Visual Content Repurposing Using Selection Algorithm. 42
Management I
- Marc Cheboldaeff:
Interactions between a Mobile Virtual Network Operator and External Networks with Regard to Service Triggering. 43 - Birger Tödtmann, Erwin P. Rathgeb:
Integrated Management of Distributed Packet Filter Configurations in Carrier-Grade IP Networks. 44 - José Soler
, Michael Gandy:
Personalized Home-Networks. 45 - Gaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte:
An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. 46 - Sartaj Sahni, Nageswara S. V. Rao
, Sanjay Ranka
, Yan Li, Eun-Sung Jung
, Nara Kamath:
Bandwidth Scheduling and Path Computation Algorithms for Connection-Oriented Networks. 47
Management II
- Alexandre Mateus, Pedro Ferreira
:
Inefficiency from Provisioning the Internet Selfishly. 48 - Sven Ubik, Demetres Antoniades, Arne Øslebø:
ABW - Short-Timescale Passive Bandwidth Monitoring. 49 - Edmund Smith, Paul Anderson:
Toward Broad-Spectrum Autonomic Management. 50 - Sebastien Linck, Eugen Dedu, François Spies
:
Distance-Dependent RED Policy (DDRED). 51 - Jun Lv, Xing Li, Tong Li:
The New Detection Algorithms for Network Traffic Anomalies. 52
Management III
- Hylke W. van Dijk, Hans Scholten, Alvaro Tobalina, Victor Garcia Munoz, Stephane Milanini, Antonio Kung:
Open Home Networks: The TEAHA Approach. 53 - Anahita Gouya, Noël Crespi:
Service Broker for Managing Feature Interactions in IP Multimedia Subsystem. 54 - Vladimir S. Zaborovsky, Andrey Rudskoy, Alex Sigalov:
Network Traffic Invariant Characteristics: Metering Aspects. 55
Management IV
- Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. 56 - Karim Mohammed Rezaul, Vic Grout
:
CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network Traffic. 57 - Leszek Koszalka:
The Choice of Mesh Structure in Computer Networks. 58 - Miroslav Svéda, Radimir Vrba
:
Dependability-Driven Embedded Systems Networking. 59
Communication Theory I
- Hakima Mellah, Salima Hassas, I. Halilali, Z. Mesneb, Habiba Drias
:
Towards a Self Organizing Protocol for a Multi Agents System (MASSOP). 60 - Vaclav Dvorak, Jirí Jaros
, Milos Ohlídal
:
Optimum Topology-Aware Scheduling of Many-to-Many Collective Communications. 61 - Bingfeng Zhang, Weihong Zhu, Zhenming Gao:
System Capacity of Filtered Multitone Modulation. 62 - Xuelan Zou, Guangzeng Feng:
Performance Comparison of Iterative Decoding Algorithm Using the Extrinsic Information Transfer Chart. 63
Communication Theory II
- Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li:
Empirical Study on the Evolution of PlanetLab. 64 - Hanxun Zhou, Yingyou Wen, Hong Zhao:
Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. 65 - Ahmed M. Mahdy, Jitender S. Deogun:
Optimizing Free Space Optics for City-Wide Wireless Networks. 66 - Dariusz Koscielnik:
The Structure of a Control Network Integrated with the S-bus of an ISDN Network. 67
Signal Processing I
- Pavel Zahradnik, Miroslav Vlcek, Boris Simák
:
DC-Notch FIR Filters for Zero-IF Receivers. 68 - Pavel Silhavy:
Time Domain Equalization in Modern Communication Systems Based on Discrete Multitone Modulation. 69 - Michal Kohoutek, Kamil Vrba:
Image Processing Method Based on Subpixel Analysis for Accurate Measurement of Dimensions. 70
Signal Processing II
- Eva Gescheidtova, Radek Kubasek, Karel Bartusek
, Zdenek Smékal
:
Shortening the Switching Times of Gradients for MR Tomography and Spectroscopy. 71 - Ivo Lattenberg, Kamil Vrba:
Low Input-Impedance Current-Mirror for High-Speed Data Communication. 72 - Martin Minarcik, Kamil Vrba:
Continuous-Time Multifunctional Filters with Wide Bandwidth Using Universal Voltage Conveyors. 73
Standards/Applications I
- Silke Holtmanns, Son Phan-Anh:
Access Authentication to IMS Systems in Next Generation Networks. 74 - I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang:
A Novel Early DBA Mechanism with Prediction-Based Fair Excessive Bandwidth Reallocation Scheme in EPON. 75 - Tatiana Kovacikova, Pavel Segec
:
NGN Standards Activities in ETSI. 76 - Petr Krupa
, Michal Javorník, Otto Dostál:
Opportunities of Today's ICT Technologies for Support of Education and Training in Radiology. 77
Optical/Switching I
- Wencheng Lu, Sartaj Sahni:
Succinct Representation of Static Packet Forwarding Tables. 78 - Sartaj Sahni, Haibin Lu:
Dynamic Tree Bitmap for IP Lookup and Update. 79 - I-Shyan Hwang, Ren-Yuan Cheng, Zen-Der Shyu:
A Novel Dynamic Multiple Rings-Based Local Restoration for One-to-Multipoint Multicast Traffic in WDM Mesh Networks. 80 - I-Shyan Hwang, San-Nan Lee, Kuo-Chang Chien:
A High Performance Multicast Scheme Based on Virtual 2D Torus Topology. 81 - Weiming Wang, Ligang Dong, Bin Zhuge, Ming Gao, Fenggen Jia, Rong Jin, Jin Yu, Xiaochun Wu:
Design and Implementation of an Open Programmable Router Compliant to IETF ForCES Specifications. 82 - Yan Pan, Lacra Pavel
:
Iterative Algorithms for Nash Equilibrium of an Extended OSNR Game. 83
Multimedia/Multicast I
- Xiaogang Yang, Lei Lei:
End-to-End Congestion Control for H.264/SVC. 84 - Dan Komosny, Vit Novotny:
Tree Structure for Specific-Source Multicast with Feedback Aggregation. 85 - Kari Aho, Tapani Ristaniemi, Janne Kurjenniemi, Ville Haikola:
Performance Enhancement of Multimedia Broadcast Multicast Service (MBMS) with Receive Diversity. 86 - Raimund Schatz, Norbert Jordan, Siegfried Wagner:
Beyond Broadcast--A Hybrid Testbed for Mobile TV 2.0 Services. 87
Performance I
- Dang Nguyen, Pascale Minet:
Scalability of the OLSR Protocol with the Fish Eye Extension. 88 - Konstantin Shemyak, Kai Vehmanen:
Scalability of TCP Servers, Handling Persistent Connections. 89 - Guoqing Li, Jing Zhu:
Performance Analysis on Utilizing Directional Antenna in High-Density WLAN. 90 - Guangwen Li, Guangzeng Feng:
Weighted IS Method of Estimating FER of LDPC Codes in High SNR Region. 91
Performance II
- Thi-Thanh-Mai Hoang:
Planning of IP Networks with Quality of Service Guarantee. 92 - Marina Petrova, Lili Wu, Petri Mähönen, Janne Riihijärvi:
Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks. 93 - Thomas C. Schmidt
, Matthias Wählisch
, Ying Zhang:
On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing. 94 - Iwona Pozniak-Koszalka, Dawid Zydek:
Algorithms of Unicast, Multicast and Broadcast Transmission for Optical Switches. 95
Security I
- Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb:
The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. 96 - Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira:
Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. 97 - M. Shirantha de Silva, David J. Parish, Peter Sandford, Jonathan M. Sandford:
Automated Detection of Emerging Network Security Threats. 98
Security II
- Jens Rüdinger, Adolf Finger:
Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. 99 - Peter Sandford, David J. Parish, Jonathan M. Sandford:
Traffic Summary Analysis for Network Abuse Detection in High Date-Rate ISP Networks. 100 - Somchart Fugkeaw
, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A Robust Single Sign-On Model Based on Multi-Agent System and PKI. 101
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.