


default search action
ICON 2003: Sydney, NSW, Australia
- 11th IEEE International Conference on Networks, ICON 2003, September 28 - October 1, 2003 Sydney, NSW, Australia. IEEE 2003, ISBN 0-7803-7788-5

- Xiaohu Ge

, Guangxi Zhu, Yaoting Zhu:
A new model for network traffic based on alpha-stable self-similar processes. 1-5 - Guoqiang Mao

:
Finite timescale range of interest for self-similar traffic measurements, modelling and performance analysis. 7-12 - Yusheng Ji, Takayuki Fujino, Shunji Abe, Jun Matsukata, Shoichiro Asano:

On the impact of time scales on tail behavior of long-range dependent Internet traffic. 13-18 - K. C. Yong, Z. S. Lai, Akkihebbal L. Ananda:

Integrated network traffic measurement and billing system. 19-24 - Roland Bless, Götz Lichtwald, Markus Schmidt, Martina Zitterbart:

Fast scoped rerouting for BGP. 25-30 - Hassan Gobjuka:

Forwarding-loop-free configuration for IBGP networks. 31-37 - Martin McKenny, Julian A. B. Dines, David Harle:

Transporting multiple classes of traffic over a generic routing device - an investigation into the performance of the RapidIO™ interconnect architecture. 39-44 - Sebastian Zander, Grenville J. Armitage, Clancy Malcolm:

Dynamics and cachability of Web sites: implications for inverted capacity networks. 45-50 - Mehran Dowlatshahi, Glen MacLarty, Michael Fry:

A scalable and efficient architecture for service discovery. 51-56 - Yousef Darmani

, L. White, Michael J. Liebelt:
New methods for lost voice packet recovery in active networks. 57-62 - Doan B. Hoang, Bushar Yousef, Glynn Rogers:

The design of a secure, extensible, and deployable-programmable network platform. 63-68 - David Soen-Mun Chan, Khim Shiong Chua, Christopher Leckie, Ajeet Parhar:

Visualisation of power-law network topologies. 69-74 - Zari Dzalilov, Iradj Ouveysi, Alexander Rubinov:

A lifetime measure for telecommunication network: theoretical aspects. 75-79 - Artur Ziviani, Serge Fdida, José Ferreira de Rezende

, Otto Carlos Muniz Bandeira Duarte:
Similarity models for Internet host location. 81-86 - M. J. Sim, Guven Mercankosk:

Superposition of periodic streams - interval of significance. 87-92 - Jaeyong Lim, Sanguthevar Rajasekaran:

Fast IP lookup algorithms. 93-97 - Hossein Mohammadi, Nasser Yazdani, Behnam Robatmili, Mehrdad Nourani:

HASIL: hardware assisted software-based IP lookup for large routing tables. 99-104 - Hidekazu Miyoshi, John S. Thompson:

SIRS: selective intersected rule search for packet classification. 105-110 - Kang Li, Francis Chang, Damien Berger, Wu-chang Feng:

Architectures for packet classification caching. 111-117 - Thanh Vinh Nguyen, Chun Tung Chou, Paul Boustead:

Provisioning content distribution networks over shared infrastructure. 119-124 - Novella Bartolini, Francesco Lo Presti, Chiara Petrioli:

Optimal dynamic replica placement in content delivery networks. 125-130 - Ta Nguyen Binh Duong, Suiping Zhou:

A dynamic load sharing algorithm for massively multiplayer online games. 131-136 - Grenville J. Armitage:

An experimental estimation of latency sensitivity in multiplayer Quake 3. 137-141 - Purnima M. Mavinkurve, Hung Q. Ngo, Himanshu Mehra:

MIP3S: algorithms for power-conserving multicasting in static wireless ad hoc networks. 143-148 - Jean Frédéric Myoupo:

Dynamic initialization protocols for mobile ad hoc networks. 149-154 - Markus Borschbach, Wolfram-Manfred Lippe:

A local optimum selection criterion for the physical neighbor connectivity of ad hoc networks. 155-160 - Gaurav Srivastava, Paul Boustead, Joe F. Chicharo, Christopher Ware:

TCMCA: a source-based distributed topology control algorithm for mission critical applications in mobile ad-hoc networks. 161-166 - Jianjian Bian, Sunil P. Khatri:

IP routing table compression using ESPRESSO-MV. 167-172 - Jason Rouse:

Probabilistic modeling in support of preemptive congestion control. 173-178 - Somnuk Puangpronpitag, Roger Boyle, Karim Djemame

:
Explicit rate adjustment: an efficient congestion control protocol for layered multicast. 179-184 - Feng Shi, Ke Xu, Jianping Wu:

An equation-based network-supported for layered multicast congestion control. 185-189 - Shin-Hung Chang, Ray-I Chang, Jan-Ming Ho, Yen-Jen Oyang:

PSC: a priority selected cache algorithm for streaming video over Internet. 191-196 - Carmelo Ragusa, Antonio Liotta, George Pavlou:

A scalable application-level multicast approach based on mobile agents. 197-202 - Moufida Maimour

, Cong-Duc Pham:
Dealing with heterogeneity in a fully reliable multicast protocol. 203-209 - Sanchai Rattananon, Björn Landfeldt, Aruna Seneviratne:

Extending REBEKAH-IP with central port allocations for un-ambiguous IPv4 address expansion. 211-216 - Gustav Rosenbaum, William Lau, Sanjay K. Jha

:
Recent directions in virtual private network solutions. 217-223 - Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp:

A hybrid QoS routing strategy for suburban ad-hoc networks. 225-230 - Illya Stepanov, Jörg Hähner

, Christian Becker, Jing Tian, Kurt Rothermel:
A meta-model and framework for user mobility in mobile networks. 231-238 - Chang Woo Pyo, Jie Li

, Hisao Kameda:
Simulation studies on dynamic and distributed domain-based mobile IPv6 mobility management. 239-244 - Jun-seob Lee, Jae Hong Min, Ki-Shik Park, Sang-Ha Kim:

Paging extension for hierarchical mobile IPv6: P-HMIPv6. 245-248 - Ernesto Exposito, Patrick Sénac, Michel Diaz:

FPTP: the XQoS aware and fully programmable transport protocol. 249-254 - Armando L. Caro Jr., Paul D. Amer, Janardhan R. Iyengar, Randall R. Stewart:

Retransmission policies with transport layer multihoming. 255-260 - Damien Phillips, Jiankun Hu

, Bill Lloyd-Smith, Richard Harris:
A note on an analytic model for slow start in TCP. 261-264 - Xuezheng Liu, Guangwen Yang, Dingxing Wang:

Stationary and adaptive replication approach to data availability in structured peer-to-peer overlay networks. 265-270 - Thomas Fuhrmann:

On the topology of overlay-networks. 271-276 - Tim Hsin-Ting Hu, Aruna Sereviratne:

General clusters in peer-to-peer networks. 277-282 - Aaron Harwood, Minh Truong:

Multi-space distributed hash tables for multiple transport domains. 283-287 - Dongliang Guan, Songyu Yu:

A two-level patching scheme for video multicast. 289-293 - Eduard Popovici, Ralf Mahlo, Mario Zühlke, Hartmut König:

Consistency support for a decentralized management in close multiparty conferences using SIP. 295-300 - Alexander A. Kist, Richard J. Harris:

Using virtual SIP links to enable QoS for signalling. 301-306 - Paul Hatalsky, Hugh Smith, Matthew Carlton:

Call admission control for video phone applications. 307-312 - Matthew Burnside, Angelos D. Keromytis:

Accelerating application-level security protocols. 313-318 - Marcel Bennicke, Peter Langendörfer

:
Towards automatic negotiation of privacy contracts for Internet services. 319-324 - Rongbo Du, Reihaneh Safavi-Naini, Willy Susilo

:
Web filtering using text classification. 325-330 - Geon Woo Kim, Jong-Wook Han, Dong-Il Seo:

Mobile IPv6 security while traversing a NAT. 331-335 - Laurent Lancérica, Laurent Dairaine, Jérôme Lacan:

Evaluation of content-access QoS for various dissemination strategies in peer to peer networks. 337-342 - Wei Ye, Asad I. Khan, Elizabeth A. Kendall:

Distributed network file storage for a serverless (P2P) network. 343-347 - Chao-Yang Wang, Feng Zhou, Yao-Long Zhu, Tow Chong Chong, Bo Hou, Wei-Ya Xi:

Simulation of fibre channel storage area network using SANSim. 349-354 - Rui M. F. Coelho, Joel J. P. C. Rodrigues, Mário M. Freire

:
High performance optical Internet backbones with mesh topologies. 355-359 - Dirk Abendroth, Ulrich Killat:

Effective bandwidth shaping: a framework for resource dimensioning. 361-366 - Seungwan Ryu, Jung-Sook Bae:

Design of a pro-active queue management. 367-372 - Guoqiang Mao

, Daryoush Habibi:
Connection admission control - closing the loop. 373-378 - Tarith Devadason, Guven Mercankosk:

Observations on a class of rate-based schedulers. 379-384 - Amitabh Saxena, Ben Soh:

A new paradigm for group cryptosystems using quick keys. 385-389 - Junqi Zhang, Vijay Varadharajan, Yi Mu:

A novel dynamic key management scheme for secure multicasting. 391-395 - Amitabh Saxena, Ben Soh:

Contributory approaches to centralized key agreement in dynamic peer groups. 397-402 - Kostas G. Anagnostakis

, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis, Dekai Li:
A cooperative immunization system for an untrusting Internet. 403-408 - Javier Aracil, Mikel Izal, Daniel Morató, Eduardo Magaña:

Multiresolution analysis of optical burst switching traffic. 409-412 - Konstantinos V. Miliotis, Georgios I. Papadimitriou, Andreas S. Pomportsis:

Adaptive weight functions for wavelength-continuous WDM multi-fiber networks. 413-418 - Tomoya Kitani, Masataka Yonedu, Nobuo Funabiki, Tom Nakanishi, Kiyohiko Okayama, Teruo Higashino:

A two-stage hierarchical algorithm for wavelength assignment in WDM-based Bidirectional Manhattan Street Networks. 419-424 - Raja Datta, Sujoy Ghose, Indranil Sengupta:

A rerouting technique with minimum traffic disruption for dynamic traffic in WDM networks. 425-430 - Claus Bauer:

Packet scheduling in input - queued switches with a speedup of less than two. 431-436 - Teck Meng Lim, Bu-Sung Lee, Chai Kiat Yeo

:
Weighted deficit earliest departure first scheduling. 437-442 - Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:

Distributed bandwidth reservation by probing for available bandwidth. 443-448 - Lars-Olof Burchard:

On the performance of computer networks with advance reservation mechanisms. 449-454 - Udaya Kiran Tupakula, Vijay Varadharajan:

Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture. 455-460 - Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:

WebSOS: protecting web servers from DDoS attacks. 461-466 - Toshiaki Ogawa, Fumitaka Nakamura, Yasushi Wakahara:

Branch label based probabilistic packet marking for IP traceback. 467-474 - Jenshiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung:

Efficient dynamic probabilistic packet marking for IP traceback. 475-480 - Nicolas Montavont, Thomas Noël:

A new middleware for pervasive IPv6 mobile computing. 481-488 - Klaus Darilion, Wolfgang Kampichler, Karl M. Göschka:

Event-based radio communication signalling using the session initiation protocol. 489-494 - Moo Young Kim, W. Bastiaan Kleijn

:
Rate-distortion comparisons between FEC and MDC based on Gilbert channel model. 495-500 - Ming Li, Doan B. Hoang, Andrew James Simmonds:

Fair intelligent admission control over DiffServ network. 501-506 - Timothy Chee-Kin Hui, Chen-Khong Tham:

Reinforcement learning-based dynamic bandwidth provisioning for quality of service in differentiated services networks. 507-512 - Hannan Xiao

, Kee Chaing Chua:
Adaptive ingress admission control for differentiated services. 513-518 - Chee-Wei Tan, Chen-Khong Tham

:
Efficient implementation of relative differentiated services using proportional probabilistic priority. 519-524 - J. D. Judd, John C. McEachen, James Bret Michael, Daniel W. Ettlich:

Network stream splitting for intrusion detection. 525-530 - Xuan Dau Hoang

, Jiankun Hu
, Peter Bertók
:
A multi-layer model for anomaly intrusion detection using program sequences of system calls. 531-536 - Omesh Tickoo, Satish Raghunath, Shivkumar Kalyanaraman:

Route fragility: a novel metric for route selection in mobile ad hoc networks. 537-542 - Ying Zhang, Aniruddha Rangnekar, Ali Aydin Selçuk

, Ali Biçak, Deepinder P. Sidhu:
A performance comparison of zone-based multicast protocols for mobile ad hoc networks. 543-548 - Robin Chellappa Doss, Andrew Jennings, Nirmala Shenoy:

Route discovery and reconstruction in mobile ad hoe networks. 549-554 - Chun-Hung Richard Lin, Guo-Yuan Mikko Wang:

A duplicate address resolution protocol in mobile ad hoe networks. 555-560 - Yen-Cheng Chen, Yao-Jung Chan, Cheung-Wo She:

Enabling location-based services on wireless LANs. 567-572 - Yunli Chen, Qing-An Zeng, Dharma P. Agrawal:

Performance analysis of IEEE 802.11e enhanced distributed coordination function. 573-578 - Yuki Moritani, Yukio Atsumi:

Efficient bandwidth utilization through multicast receiver aggregation in wireless LAN spot. 579-584 - Chunhung Richard Lin, Yuan-Hao Johnson Chang:

AAR: an adaptive rate control protocol for mobile ad hoc networks. 585-590 - Justin Lipman

, Paul Boustead, Joe F. Chicharo, John Judge:
Resource aware information dissemination in ad hoc networks. 591-596 - J. Ye, W. C. Wong, Kee Chaing Chua:

Power-efficient multicasting in ad hoc networks. 597-602 - Ramin Hekmat, Piet Van Mieghem:

Degree distribution and hopcount in wireless ad-hoc networks. 603-609 - Pratik Das, Jamil Y. Khan:

Variable bit rate packet data over the WCDMA uplink. 611-616 - Bang Wang, Kee Chaing Chua:

Transmission control policy for data services over a time-varying wireless channel. 617-621 - Amoakoh Gyasi-Agyei:

BL2xF - channel state-dependent scheduling algorithms for wireless IP networks. 623-628 - Salah-Eddine Elayoubi, Tijani Chahed, Gérard Hébuterne:

Resource management in UMITS : from admission control to packet scheduling. 629-634 - S. Malarvizhi, B. Ramkumar, N. Sabarinathan, M. Meenakshi

:
A new MAC protocol based on collision resolution and spread spectrum coding. 635-640 - Wei-Yeh Chen, Jean-Lien C. Wu, Haw-Yun Shin:

Performance analysis of dynamic resource allocation with finite buffers in cellular networks. 641-646 - Kuo-Chung Chu

, Frank Yeong-Sung Lin, Shin-Fu Wang:
An admission control algorithm for CDMA networks. 647-652 - Alfandika Nyandoro, Prawit Chumchu

, Mahbub Hassan:
Soft per-flow throughput guarantees in contention based WLANs. 653-658 - Sagar Dharia, Dharma P. Agrawal:

A novel distributed resource-aware scalable scheme for Scatternet formation. 659-664 - Timothy F. Kneeland, Richard A. Raines, Michael A. Temple, Rusty O. Baldwin:

Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices. 665-671 - Balázs Bakos, Gergely Csúcs, Lóránt Farkas, Jukka K. Nurminen:

Peer-to-peer protocol evaluation in topologies resembling wireless networks. An experiment with Gnutella query engine. 673-680 - Neha Jain, Dilip K. Madathil, Dharma P. Agrawal:

Exploiting multi path routing to achieve service differentiation in sensor networks. 681-686 - Greg Daley, Brett Pentland, Richard Nelson:

Movement detection optimizations in mobile IPv6. 687-692 - Rungrat Wiangsripanawan, Reihaneh Safavi-Naini, Willy Susilo

:
Securing mobile IP enabled laptop. 693-698 - Ricky Robinson, Jadwiga Indulska

:
Superstring: a scalable service discovery protocol for the wide-area pervasive environment. 699-704 - Sasitharan Balasubramaniam

, Jadwiga Indulska
:
Vertical handovers as adaptation methods in pervasive systems. 705-710 - Tomohiro Nakagawa, Takashi Yoshikawa, Ken Ohta

, Shoji Kurakake:
Flexible route control for wireless multi-hop internet access. 711-716 - Kent Pedersen, Benoist Sebire, Guillaume Sebire, Glenn Platt:

ARQ considerations for the new GSM/EDGE flexible layer one. 717-722 - Christophe S. Jelger, Thomas Noël:

Performance evaluation of multicast transmissions with mobile sources. 723-728 - Shaobin Cai, Xiao-Zong Yang, Wenbin Yao:

A comparison between the PoolODMRP and the PatchODMRP. 729-735

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














