


default search action
18th ICNP 2010: Kyoto, Japan
- Proceedings of the 18th annual IEEE International Conference on Network Protocols, ICNP 2010, Kyoto, Japan, 5-8 October, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8644-1

- Dejun Yang

, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang:
Routing in max-min fair networks: A game theoretic approach. 1-10 - Fernando A. Kuipers, Anteneh Beshir, Ariel Orda, Piet Van Mieghem:

Impairment-aware path selection and regenerator placement in translucent optical networks. 11-20 - Mingui Zhang, Cheng Yi, Bin Liu, Beichuan Zhang

:
GreenTE: Power-aware traffic engineering. 21-30 - Zhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam:

Fast routing table lookup based on deterministic multi-hashing. 31-40 - Jiangwei Zhou, Yu Chen, Ben Leong

, Boqin Feng:
Practical Virtual Coordinates for large wireless sensor networks. 41-51 - Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang

, Jun Huang
, Mo Sha
, Liusheng Huang:
Passive interference measurement in Wireless Sensor Networks. 52-61 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Junliang Liu, Jun Luo:

ETOC: Obtaining robustness in component-based localization. 62-71 - Yiyang Li, Jianxia Ning, Zhengyuan Xu, Srikanth V. Krishnamurthy

, Gang Chen:
UVOC-MAC: A MAC protocol for outdoor ultraviolet networks. 72-81 - Jung Il Choi, Mayank Jain

, Maria A. Kazandjieva, Philip Alexander Levis:
Granting silence to avoid wireless collisions. 82-91 - Raju Kumar, Srikar Tati, Felipe de Mello, Srikanth V. Krishnamurthy

, Thomas La Porta:
Network Coding aware Rate Selection in multi-rate IEEE 802.11. 92-102 - Alexander J. T. Gurney, Timothy G. Griffin:

Neighbor-specific BGP: An algebraic exploration. 103-112 - Luca Cittadini, Giuseppe Di Battista

, Thomas Erlebach
, Maurizio Patrignani, Massimo Rimondini
:
Assigning AS relationships to satisfy the Gao-Rexford conditions. 113-123 - Zied Ben-Houidi, Mickael Meulle:

A new VPN routing approach for large scale networks. 124-133 - Tongqing Qiu, Lusheng Ji, Dan Pei

, Jia Wang, Jun (Jim) Xu:
TowerDefense: Deployment strategies for battling against IP prefix hijacking. 134-143 - Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang:

Identifying suspicious activities through DNS failure graph analysis. 144-153 - Lei Yang

, Jinsong Han, Yong Qi, Yunhao Liu:
Identification-free batch authentication for RFID tags. 154-163 - Yating Hsu, David Lee:

Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization. 164-173 - Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda:

Firewall modules and modular firewalls. 174-182 - Youngtae Noh

, Paul Wang, Uichin Lee, Dustin Torres, Mario Gerla:
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks. 183-192 - Wei Gao, Guohong Cao:

On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks. 193-202 - Md. Yusuf Sarwar Uddin

, Brighten Godfrey, Tarek F. Abdelzaher:
RELICS: In-network realization of incentives to combat selfishness in DTNs. 203-212 - Chuan Han, Yaling Yang, Yongxiang Peng:

Optimal cache-based route repair for real-time traffic. 213-222 - Zhenyu Yang, Ming Li, Wenjing Lou:

CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. 223-232 - Joon Yoo, Brian Sung Chul Choi, Mario Gerla:

An opportunistic relay protocol for vehicular road-side access with fading channels. 233-242 - Kebin Liu, Mo Li

, Yunhao Liu, Xiang-Yang Li, Minglu Li, Huadong Ma:
Exploring the hidden connectivity in urban vehicular networks. 243-252 - Shaoquan Zhang, Ziyu Shao, Minghua Chen

:
Optimal distributed P2P streaming under node degree bounds. 253-262 - Matthew J. Probst, Jun Cheol Park, Ravin Abraham, Sneha Kumar Kasera:

SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution. 263-274 - Yuan Feng, Baochun Li, Bo Li:

Peer-assisted VoD prefetching in double auction markets. 275-284 - Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck:

TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation. 285-294 - Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:

Scalable video multicast with joint layer resource allocation in broadband wireless networks. 295-304 - Jun Huang

, Guoliang Xing, Gang Zhou, Ruogu Zhou:
Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance. 305-314 - Teruo Higashino, Kenji Suzuki:

Message from the General Co-Chairs. 1-2 - Sonia Fahmy

, Toru Hasegawa:
Message from the technical program committee chairs. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














