ICNP B

34 papers

YearTitle / Authors
2010A new VPN routing approach for large scale networks.
Zied Ben-Houidi, Mickael Meulle
2010An opportunistic relay protocol for vehicular road-side access with fading channels.
Joon Yoo, Brian Sung Chul Choi, Mario Gerla
2010Assigning AS relationships to satisfy the Gao-Rexford conditions.
Luca Cittadini, Giuseppe Di Battista, Thomas Erlebach, Maurizio Patrignani, Massimo Rimondini
2010Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization.
Yating Hsu, David Lee
2010Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance.
Jun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou
2010CodePlay: Live multimedia streaming in VANETs using symbol-level network coding.
Zhenyu Yang, Ming Li, Wenjing Lou
2010DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks.
Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, Mario Gerla
2010ETOC: Obtaining robustness in component-based localization.
Xiaoping Wang, Yunhao Liu, Zheng Yang, Junliang Liu, Jun Luo
2010Exploring the hidden connectivity in urban vehicular networks.
Kebin Liu, Mo Li, Yunhao Liu, Xiang-Yang Li, Minglu Li, Huadong Ma
2010Fast routing table lookup based on deterministic multi-hashing.
Zhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam
2010Firewall modules and modular firewalls.
Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda
2010Granting silence to avoid wireless collisions.
Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, Philip Alexander Levis
2010GreenTE: Power-aware traffic engineering.
Mingui Zhang, Cheng Yi, Bin Liu, Beichuan Zhang
2010Identification-free batch authentication for RFID tags.
Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu
2010Identifying suspicious activities through DNS failure graph analysis.
Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang
2010Impairment-aware path selection and regenerator placement in translucent optical networks.
Fernando A. Kuipers, Anteneh Beshir, Ariel Orda, Piet Van Mieghem
2010Message from the General Co-Chairs.
Teruo Higashino, Kenji Suzuki
2010Message from the technical program committee chairs.
Sonia Fahmy, Toru Hasegawa
2010Neighbor-specific BGP: An algebraic exploration.
Alexander J. T. Gurney, Timothy G. Griffin
2010Network Coding aware Rate Selection in multi-rate IEEE 802.11.
Raju Kumar, Srikar Tati, Felipe de Mello, Srikanth V. Krishnamurthy, Thomas La Porta
2010On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks.
Wei Gao, Guohong Cao
2010Optimal cache-based route repair for real-time traffic.
Chuan Han, Yaling Yang, Yongxiang Peng
2010Optimal distributed P2P streaming under node degree bounds.
Shaoquan Zhang, Ziyu Shao, Minghua Chen
2010Passive interference measurement in Wireless Sensor Networks.
Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Jun Huang, Mo Sha, Liusheng Huang
2010Peer-assisted VoD prefetching in double auction markets.
Yuan Feng, Baochun Li, Bo Li
2010Practical Virtual Coordinates for large wireless sensor networks.
Jiangwei Zhou, Yu Chen, Ben Leong, Boqin Feng
2010Proceedings of the 18th annual IEEE International Conference on Network Protocols, ICNP 2010, Kyoto, Japan, 5-8 October, 2010
2010RELICS: In-network realization of incentives to combat selfishness in DTNs.
Md. Yusuf Sarwar Uddin, Brighten Godfrey, Tarek F. Abdelzaher
2010Routing in max-min fair networks: A game theoretic approach.
Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang
2010Scalable video multicast with joint layer resource allocation in broadband wireless networks.
Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan
2010SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution.
Matthew J. Probst, Jun Cheol Park, Ravin Abraham, Sneha Kumar Kasera
2010TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation.
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck
2010TowerDefense: Deployment strategies for battling against IP prefix hijacking.
Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu
2010UVOC-MAC: A MAC protocol for outdoor ultraviolet networks.
Yiyang Li, Jianxia Ning, Zhengyuan Xu, Srikanth V. Krishnamurthy, Gang Chen