


default search action
ICON 2007: Adelaide, Australia
- Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia. IEEE 2007, ISBN 1-4244-1230-7

A1: Mobile Ad Hoc Networks
- Jon Arnold, Nigel G. Bean

, Miro Kraetzl, Matthew Roughan
:
Node Localisation in Wireless Ad Hoc Networks. 1-6 - Hongxun Liu, José G. Delgado-Frias, Sirisha Medidi:

Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks. 7-12 - Roy Timo, Kim L. Blackmore

, Leif Hanlen
:
Strong Stochastic Stability for MANET Mobility Models. 13-18 - Jerry Chun-Ping Wang, Mehran Abolhasan

, Daniel Robert Franklin
, Farzad Safaei
, Justin Lipman
:
On Separating Route Control and Data Flows in Multi-radio Multi-hop Ad Hoc Network. 19-24 - Sirisha Medidi, Peter Cappetto:

History-based route selection for reactive ad hoc routing protocols. 25-30
B1 : IP Traffic and QoS
- Grenville J. Armitage:

A Packet Arrival Model for Wolfenstein Enemy Territory Online Server Discovery Traffic. 31-36 - Alexander A. Kist

:
Erlang B as a Performance Model for IP Flows. 37-41 - Sebastian Zander, Grenville J. Armitage, Philip Branch:

An Empirical Evaluation of IP Time To Live Covert Channels. 42-47 - Jianqun Chen, Weiming Wang, Bin Zhuge, Ligang Dong:

A Method of Bandwidth Allocation Mechanism in ForCES Transport Mapping Layer. 48-52 - Li Ji, Xia Yin, Xingang Shi, Zhiliang Wang:

A Synthetic Streaming Quality Measurement System on IP Networks. 53-58
C1 : Network Security
- Stephen Mark Glass, Vallipuram Muthukkumarasamy:

A Study of the TKIP Cryptographic DoS Attack. 59-65 - Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:

Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. 66-71 - Jinyoung Moon, Jongyoul Park, Eui Hyun Paik:

JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. 72-76 - Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool:

Lightweight Detection of DoS Attacks. 77-82 - You Chen, Wen-Fa Li, Xueqi Cheng:

Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM. 83-88
D1: Scheduling and Resource Management I
- Tze Wei Tang, David Green, Michael P. Rumsewicz, Nigel G. Bean

:
An Architecture for IEEE 802.16 MAC Scheduler Design. 89-94 - Stephan Schmidt, Jérôme Kunegis:

Scalable Bandwidth Optimization in Advance Reservation Networks. 95-100 - Somnuk Puangpronpitag

:
Multi-Rate Multicast Congestion Control by Explicit Rate Adjustment and Multicast-encouraging TCP-friendliness. 101-106 - Salman AlQahtani

:
Resource Allocation Schemes for 3G Mobile Service Providers with Heterogeneous Traffic. 107-111 - Cherif Ghazel

, Leïla Azouz Saïdane:
An Improved Model for Next Generation Networks with Guaranteed End-to-End Quality of Service. 112-117
A2: Peer to Peer and Overlay Networks
- Go Hasegawa

, Masayoshi Kobayashi, Masayuki Murata
, Tutomu Murase:
"Free-riding" traffic problem in routing overlay networks. 118-123 - Xinbo Jiang, Farzad Safaei

, Paul Boustead:
Enhancing the multicast performance of structured P2P overlay in supporting Massively Multiplayer Online Games. 124-129 - Dhafer Ben Khedher, Roch H. Glitho

, Rachida Dssouli:
A Novel Overlay-Based Failure Detection Architecture for MANET Applications. 130-135 - Sugang Xu, Hiroaki Harai:

Process/Processor Mapping Based on Similarity Analysis in Heterogeneous Grid Computing Environment. 136-142 - Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing Li:

Myth: An Accurate and Scalable Network Coordinate System under High Node Churn Rate. 143-148
B2 : Optical Networks
- Yawen Chen

, Hong Shen:
RWA of Hypercube Communications Embedded on A Family of Optical Double-Loop Networks. 149-154 - Wang-Rong Chang, Hui-Tang Lin, Sheng-Jhe Hong, Chai-Lin Lai:

A Novel WDM EPON Architecture with Wavelength Spatial Reuse in High-Speed Access Networks. 155-160 - André Soares

, William Giozza
, Paulo R. F. Cunha
:
Classification Strategy to Mitigate Unfairness in All-Optical Networks. 161-165 - Ayman G. Fayoumi

:
Delay Performance Evaluation of Shared-Buffer Based All-Optical Multihop Networks. 166-169 - Simin Khazraei

, Mohammad Reza Pakravan:
Analysis of Generalized Optical Orthogonal Codes in Wireless Optical Networks Using BPPM. 170-175
C2 : Multihop Network Security
- Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao

:
Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. 176-181 - Venkatesan Balakrishnan, Vijay Varadharajan

, Udaya Kiran Tupakula, Phillip Lucs:
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. 182-187 - Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Sungyoung Lee, Heejo Lee:

A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks. 188-193 - John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee:

Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs. 194-199 - Yupeng Hu, Yaping Lin, Yonghe Liu, Weini Zeng:

RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks. 200-205
D2: Routing, Switching and Addressing
- Asad Amir Pirzada, Chris McDonald:

Trusted Greedy Perimeter Stateless Routing. 206-211 - Yuncheng Zhu, Junxiu Lu, Maoke Chen:

Potential Impacts of Four-Byte AS Numbers in Partial Deployment. 212-217 - Mahmood Ahmadi

, Stephan Wong:
A Cache Architecture for Counting Bloom Filters. 218-223 - Panita Pongpaibool, Pahol Sotthivirat, Sukumal I. Kitisin, Chavalit Srisathapornphat

:
Fast Duplicate Address Detection for Mobile IPv6. 224-229 - Myung-Kyu Yi, Jin-Woo Choi, Young-Kyu Yang:

A Pointer Forwarding Scheme for Minimizing Signaling Costs in Nested Mobile Networks. 230-234
A3: Mesh Networks
- Viet Q. Phung, Daryoush Habibi

, Hoang Nam Nguyen:
On Diverse Routing for Shared Risk Link Groups (SRLGs) in Optical Mesh Networks. 235-239 - Nobuo Funabiki, Toru Nakanishi, Walaa Hassan

, Kanako Uemura:
A Channel Configuration Problem for Access-Point Communications in Wireless Mesh Networks. 240-245 - Daryoush Habibi

, Viet Q. Phung, Hoang Nam Nguyen:
Minimizing the Number of Constraints for Shared Backup Path Protection (SBPP) in Shared Risk Link Group (SRLG) Optical Mesh Networks. 246-251 - Ryan Wishart, Asad Amir Pirzada, Marius Portmann

:
A Light-Weight Client Mobility Approach for Infrastructure Mesh Networks. 252-258 - Wael Jaafar

, Wessam Ajib, Sami Tabbane:
The Capacity of MIMO-based Wireless Mesh Networks. 259-264
B3 : Network Design, Policies and Network Management
- Shane Magrath:

Measuring and Understanding Policy System Service Rate Performnance. 265-271 - Fatna Belqasmi

, Roch H. Glitho
, Rachida Dssouli:
An IETF NSIS-Based Signaling Framework for Negotiating Registry Composition in Ambient Networks. 272-277 - Almerima Jamakovic, Steve Uhlig

:
Influence of the network structure on robustness. 278-283 - Wilson Wang-Kit Thong, Guanrong Chen

, King-Tim Ko
:
Searching ISP Router Networks for Footprints of Engineering Design Consideration. 284-288 - Dan Hong, Ye Wang, Junxiu Lu, Maoke Chen, Xing Li:

Building A Robust and Economical Internet Testbed: 6PlanetLab. 289-294
C3 : QoS in Wireless LANs
- Shafiqul Karim, David Green, Michael Peter Rumsewicz, Nigel G. Bean

:
Flexible Throughput Management in IEEE 802.11e Wireless LANs. 295-300 - Yoshihisa Kondo, Satoko Itaya, Shinji Yamaguchi, Peter Davis, Ryutaro Suzuki, Sadao Obana:

Wireless Channel Detection Based on Fluctuation of Packet Arrival Interval. 301-305 - Amir Mowlaei, Bu-Sung Lee, Teck Meng Lim, Chai Kiat Yeo

:
Service Differentiation in Wireless Networks: Adaptive Ad Hoc Qs Versus IEEE 802.11e. 306-311 - Justin Wyatt, Daryoush Habibi

, Iftekhar Ahmad
, Hushairi Zen:
Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks. 312-317 - Aruna Jayasuriya, Stefan Aust, Peter Davis, Akira Yamaguchi, Sadao Obana:

Aggregation of Wi-Fi Links: When Does it Work? 318-323
D3: Scheduling and Resource Management II
- Andreas Schweizer, Tarith Devadason, John F. Siliquini:

A Markov Model for Preference List Sizes in Combined Input Output Queued Switches with Stable Matching Algorithms. 324-329 - Dessislava Nikolova

, Chris Blondia:
Last-Backlogged First-Served Deficit Round Robin (LBFS-DRR) Packet Scheduling Algorithm. 330-335 - Masoomeh Torabzadeh, Yusheng Ji:

A Near Optimal Antenna Assignment for MIMO Systems with Low Complexity. 336-341 - Ashraf S. Mahmoud

, Mohammed A. Aabed
:
Approximation Techniques For Analytical Characterization Of Downlink Traffic Power For Multi-Service CDMA Networks. 342-347 - Enqing Dong, HongMei Hu:

A New Codebook Design Scheme Based on Ant Colony Clustering. 348-352
A4: Content Delivery Networks and Wireless Monitoring
- Udayan Deshpande, David Kotz

, Chris McDonald:
Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring. 353-358 - Jaison Paul Mulerikkal

, Ibrahim Khalil
:
An Architecture for Distributed Content Delivery Network. 359-364 - Feiselia Tan, Sebastien Ardon, Robert Hsieh:

The Impact of User Mobility Patterns on Opportunistic Content Distribution Network. 365-370 - Ramana Isukapalli:

Efficient Real Time Content Delivery on Wireless Networks. 371-375 - Ibrahim Khalil

, Ge PeiQi:
Efficient Proxy Selection in Cooperative Web Caching. 376-381
B4 : Traffic Engineering and Congestion Management
- Joel Sing, Ben Soh:

Improving Congestion Window Growth in Large Bandwidth Delay Product Networks. 382-387 - Gianluca Rizzo

, Jean-Yves Le Boudec:
Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows. 388-393 - Imène Chaieb, Jean-Louis Le Roux, Bernard Cousin

:
A New Pre-emption Policy For MPLS-TE Networks. 394-399 - Joel Sing, Ben Soh:

Improving TCP Performance: Identifying Corruption Based Packet Loss. 400-405 - Pitiporn Pakdeepinit, Tapanun Yeophantong, Pavel Chen, Pratit Santiprabhob:

Balancing Secondary Traffic Metering for DiffServ Assured Forwarding Classes. 406-411
C4 : Sensor Networks
- Ramin Hekmat, Xueli An:

A Framework for Performance Evaluation of Wireless Ad-hoc and Sensor Networks. 412-418 - Kuei-Ping Shih, Hung-Chang Chen, Bo-Jun Liu:

Integrating Target Coverage and Connectivity for Wireless Heterogeneous Sensor Networks with Multiple Sensing Units. 419-424 - Xuezhi Wang, William Moran, Marcus Brazil

:
Hyperbolic Positioning Using RIPS Measurements for Wireless Sensor Networks. 425-430 - Rui Teng, Bing Zhang, Yasuo Tan:

A Study of Localized On-Demand Data Collection in Sensor Networks. 431-436 - John C. McEachen, Wang Wei Beng:

Characterization of Traffic in Wireless Sensor Networks. 437-442
D4: Wireless MAC Protocols
- Rhys Alistair Bowden, Andrew Coyle:

Idle Times Analysis in a CSMA/CA Network. 443-448 - Johannes Lessmann:

GMAC: A Position-Based Energy-Efficient QoS TDMA MAC for Ad Hoc Networks. 449-454 - Haopeng Li, Paul D. Mitchell:

Medium Access Control Protocols in Wireless Sensor Networks. 455-460 - Hushairi Zen, Daryoush Habibi

, Alexander Rassau, Justin Wyatt:
Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs. 461-466 - Kai Juan Wong, D. K. Arvind:

A Hybrid Wakeup Signalling Mechanism for Periodic-Listening MAC Algorithms. 467-472
Poster Session
- Paul Gardner-Stephen

:
Escalating The War On SPAM Through Practical PoW Exchange. 473-476 - Ying-Wen Bai, Yung-Sen Cheng, Cheng-Hung Tsai:

An Approximate Analysis of the Balance among Performance, Utilization and Power Estimation of Server Systems by Use of the Batch Service. 477-482 - Chih-Ping Chu, Hua-Wen Tsai:

Urban-Areas based Mobility Model for Wireless Network Simulations. 483-488 - Ying Peng Que, Farzad Safaei

, Paul Boustead:
Distributed Server Delivery of Immersive VoIP Service: Balancing Between Voice Latency and Access Upload Cost. 489-494 - Z. X. Li, Q. S. Wei, Y. H. Wang:

A Novel Collaborative Fault-Tolerance Mechanism for Metadata Server Cluster. 495-500 - Andres Rojas, Philip Branch, Grenville J. Armitage:

Predictive Lawful Interception in Mobile IPv6 Networks. 501-506 - Antonio L. Cricenti, Philip Branch, Grenville J. Armitage:

Time-series Modelling of Server to Client IP Packet Length in First Person Shooter Games. 507-512 - Asad Amir Pirzada, Ryan Wishart, Marius Portmann

:
Congestion Aware Routing in Hybrid Wireless Mesh Networks. 513-518 - Anderson Fernandes P. Santos, Renato Simões Silva:

Detecting Bandwidth DDoS Attack with Control Charts. 519-524 - Hamed Shah-Mansouri, Mohammad Reza Pakravan:

Network Coding Based Reliable Broadcasting in Wireless Ad-hoc Networks. 525-530 - Ligang Dong, Fenggen Jia, Weiming Wang:

Definition and Implementation of Logical Function Blocks Compliant to ForCES Specification. 531-536 - Salah-Eddine Elayoubi, Olfa Ben Haddada:

Uplink Intercell Interference and Capacity in 3G LTE systems. 537-541 - Rehan Qureshi

, Arek Dadej:
Adding Support for Satellite Interfaces to 802.21 Media Independent Handover. 542-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














