| 2006 | A TCP-aware call admission control scheme for packet-switched wireless networks. Xinbing Wang, Do Young Eun, Wenye Wang |
| 2006 | A control-theoretic approach to improving fairness in DCF based WLANs. Xiaolin Chang, Xiaoyang Lin, Jogesh K. Muppala |
| 2006 | A distributed fairness algorithm for bus-based metropolitan optical network. Daniel Popa, Tülin Atmaca |
| 2006 | A framework for distributed key management schemes in heterogeneous wireless sensor networks. Kejie Lu, Yi Qian, Jiankun Hu |
| 2006 | A group signature scheme with signature claiming and variable linkability. He Ge, Stephen R. Tate |
| 2006 | A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systems. Qian Wang, Dan Xu, Jing Xu, Zhiyong Bu |
| 2006 | A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ. Suogang Li, Jianping Wu, Ke Xu, Ying Liu |
| 2006 | A new secure group key management scheme for multicast over wireless cellular networks. Hwa Young Um, Edward J. Delp |
| 2006 | A novel channel assignment algorithm based on topology simplification in multi-radio wirelesss mesh networks. Leiming Xu, Yong Xiang, Meilin Shi |
| 2006 | A novel queue management mechanism for improving performance of multihop flows in IEEE 802.11s based mesh networks. Nagesh Nandiraju, Deepti S. Nandiraju, Dave Cavalcanti, Dharma P. Agrawal |
| 2006 | A stratified model for security in peer networks: a case for fine grain granularity. Fernando C. Colón Osorio, Justin Whitney |
| 2006 | A survey of PKI components and scalability issues. Adam J. Slagell, Rafael Bonilla, William Yurcik |
| 2006 | A traffic-classified technique for filtering spam from bulk delivery E-mails. Ni Zhang, Yu Jiang, Binxing Fang, Li Guo, Xueqi Cheng |
| 2006 | AVARE: aggregated vulnerability assessment and response against zero-day exploits. Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
| 2006 | AWARDS: an adaptive write strategy for secure local disk systems. Mais Nijim, Xiao Qin, Tao Xie, Mohammed I. Alghamdi |
| 2006 | Adapting connected d-hop dominating sets to topology changes in wireless ad hoc networks. Jason A. Bolla, Dung T. Huynh |
| 2006 | An analytical model of TCP performance. Debessay Fesehaye Kassa, Sabine Wittevrongel |
| 2006 | An analytical study on routing overhead of two-level cluster-based routing protocols for mobile ad hoc networks. Zhihua Tao, Gongyi Wu |
| 2006 | An efficient load balancing algorithm for heterogeneous grid systems considering desirability of grid sites. Kai Lu, Riky Subrata, Albert Y. Zomaya |
| 2006 | An energy-efficient sensing coverage protocol for surveillance and monitoring applications using wireless sensors. Azzedine Boukerche, Xin Fei, Regina Borges de Araujo |
| 2006 | An improved Wu-Manber multiple patterns matching algorithm. Donghong Yang, Ke Xu, Yong Cui |
| 2006 | Analysis of power control for indoor wireless infrared CDMA communication. Amir Aminzadeh Gohari, Mohammad Reza Pakravan |
| 2006 | And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. Fernando C. Colón Osorio, Zachi Klopman |
| 2006 | Automatically deducing propagation sequences that circumvent a collaborative worm defense. Linda Briesemeister, Phillip A. Porras |
| 2006 | Avoiding store misses to fully modified cache blocks. Shiwen Hu, Lizy Kurian John |
| 2006 | BGP with an adaptive minimal route advertisement interval. Nenad Laskovic, Ljiljana Trajkovic |
| 2006 | Caching of interactive multiple choice MPEG-4 presentations. Carsten Griwodz, Frank T. Johnsen, Simen Rekkedal, Pål Halvorsen |
| 2006 | Channel distribution fairness in multi-channel wireless ad-hoc networks using a channel distribution index. Unghee Lee, Scott F. Midkiff |
| 2006 | Cluster based approaches for end-to-end complete feedback collection in multicast. Mehmet Baysan, Kamil Saraç |
| 2006 | Coding schemes for integrated transport and storage reliability. Sai B. Narasimhamurthy, Joseph Y. Hui |
| 2006 | Connectionless port scan detection on the backbone. Avinash Sridharan, Tao Ye, Supratik Bhattacharyya |
| 2006 | Data replication in collaborative sensor network systems. Denis Gracanin, Kevin P. Adams, Mohamed Eltoweissy |
| 2006 | Detection of stepping stone attack under delay and chaff perturbations. Linfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan |
| 2006 | Discovery-based role activations in role-based access control. Raman Adaikkalavan, Sharma Chakravarthy |
| 2006 | Efficient server cooperation mechanism in content delivery network. Zhiyong Xu, Yiming Hu, Laxmi N. Bhuyan |
| 2006 | Enabling mobility in enterprise security management. William R. Claycomb, Dongwan Shin |
| 2006 | Energy efficient model for data gathering in structured multiclustered wireless sensor network. Jinran Chen, Shubha Kher, Arun K. Somani |
| 2006 | Energy-efficient cooperative routing in multi-hop wireless ad hoc networks. Fulu Li, Kui Wu, Andrew Lippman |
| 2006 | Enhanced blocking probability in adaptive multimedia wireless networks. Nidal Nasser |
| 2006 | Evaluating the impact of reactivity on the performance of Web applications. Adriano C. M. Pereira, Leonardo Silva, Wagner Meira Jr. |
| 2006 | Excess bandwidth distribution in DiffServ networks. Sanjeewa Athuraliya, Harsha R. Sirisena |
| 2006 | Extending sensor network lifetime via first hop data aggregation. Shoudong Zou, Ioanis Nikolaidis, Janelle J. Harms |
| 2006 | From Network Planning to Traffic Engineering for Optical VPN and Multi-Granular Random Demands. Elias A. Doumith, Maurice Gagnaire, Olivier Audouin, Richard Douville |
| 2006 | High performance and alleviated hot-spot problem in processor frontend with enhanced instruction fetch bandwidth utilization. Prabhu Rajamani, Jatan P. Shah, Vadhiraj Sankaranarayanan, Rama Sangireddy |
| 2006 | Incorruptible system self-cleansing for intrusion tolerance. Yih Huang, David Arsenault, Arun Sood |
| 2006 | Key establishment with source coding and reconciliation for wireless sensor networks. Suat Özdemir, Hasan Cam |
| 2006 | Maille authorization - a distributed, redundant authorization protocol. Andrew Fritz, Jehan-François Pâris |
| 2006 | Maintaining an energy-efficient Bluetooth scatternet. Muralidhar Medidi, Yuanyuan Zhou |
| 2006 | Minimum-energy route configuration for wireless ad hoc networks. Le Yang, Hong-Chuan Yang, Kui Wu |
| 2006 | Monitor placement for stepping stone analysis. Yongping Tang, Yema Liverpool, Thomas E. Daniels |
| 2006 | Multiple design patterns for voice over IP (VoIP) security. Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell |
| 2006 | OS-aware tuning: improving instruction cache energy efficiency on system workloads. Tao Li, Lizy K. John |
| 2006 | On capturing and containing E-mail worms. Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu |
| 2006 | Optimising malware. José M. Fernandez, Pierre-Marc Bureau |
| 2006 | Overcoming the challenge of security in a mobile environment. Ioannis Broustis, Michalis Faloutsos, Srikanth V. Krishnamurthy |
| 2006 | PROFITIS: architecture for location-based vertical handovers supporting real-time applications. Stavros Tsiakkouris, Ian J. Wassell |
| 2006 | PaScal - a new parallel and scalable server IO networking infrastructure for supporting global storage/file systems in large-size Linux clusters. Gary Grider, Hsing-bung Chen, James Nunez, Steve Poole, Rosie Wacha, Parks Fields, Robert Martinez, Paul Martinez, Satsangat Khalsa, Abbie Matthews, Garth A. Gibson |
| 2006 | Path cost metrics for multi-hop network routing. Lijuan Cao, Teresa A. Dahlberg |
| 2006 | Performance evaluation of DS-BPSK UWB multiple-access systems in standard UWB channels. Haiyang Ding, Yanhua Zhang, Xuemei Wu |
| 2006 | Performance modeling of TCP/AQM with generalized AIMD under intermediate buffer sizes. Do Young Eun, Xinbing Wang |
| 2006 | Performance modeling of fully adaptive wormhole routing in n-dimensional mesh-connected multicomputers. Pedram Rajabzadeh, Hashem Hashemi Sarbazi-azad, Hamid Hashemi-Najafabadi, Mohamed Ould-Khaoua |
| 2006 | Performance problem analysis method for Web systems using multiple decision trees. Shinji Kikuchi, Ken Yokoyama, Akira Takeyama |
| 2006 | Polar LEO satellite constellation measurement by delay probing. Junfeng Wang, Hongxia Zhou, Fanjiang Xu, Mingtian Zhou |
| 2006 | Portal monitoring based anti-malware framework: design and implementation. Yanjun Wu, Wenchang Shi |
| 2006 | Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA |
| 2006 | QoS reliability of hierarchical clustered wireless sensor networks. Liudong Xing, Akhilesh Shrestha |
| 2006 | Reliability enhancements for a Jini and JavaSpaces based network management system. Jing Wu, Michel Savoie, Hanxi Zhang, Scott Campbell |
| 2006 | Risk reduction based survivable WDM network design. Korn Vajanapoom, David Tipper |
| 2006 | Role-based profile analysis for scalable and accurate insider-anomaly detection. Joon S. Park, Joseph Giordano |
| 2006 | Routing and wavelength assignment in optical mesh networks with wavelength conversion. Arunita Jaekel, Tahmina Khan |
| 2006 | SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clusters. Tao Xie, Xiao Qin, Mais Nijim |
| 2006 | Safe base-station repositioning in wireless sensor networks. Mohamed F. Younis, Aseem Lalani, Mohamed Eltoweissy |
| 2006 | SeMAC: robust broadcast MAC protocol for multi-hop wireless ad hoc networks. Tiantong You, Hossam S. Hassanein, Chi-Hsiang Yeh |
| 2006 | Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Kui Wu, Dennis Dreef, Bo Sun, Yang Xiao |
| 2006 | Source traffic regulation in reserved delivery subnetworks. Ruibiao Qiu, Jonathan S. Turner |
| 2006 | TMS: a trust management system for access control in dynamic collaborative environments. William Joseph Adams, Nathaniel J. Davis IV |
| 2006 | The delay distribution of IEEE 802.11e EDCA and 802.11 DCF. Paal E. Engelstad, Olav N. Østerbø |
| 2006 | The impacts of timing constraints on virtual channels multiplexing in interconnect networks. Ahmad Khonsari, Mohamed Ould-Khaoua, Abbas Nayebi, Hamid Sarbazi-Azad |
| 2006 | Topological dynamics characterization for layered satellite networks. Junfeng Wang, Yuemei Hu, Hongxia Zhou, Mingtian Zhou |
| 2006 | Total information efficiency in multihop wireless networks. André G. Mignaco, Paulo Cardieri |
| 2006 | Towards a framework for worm-defense evaluation. Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein |
| 2006 | Transmit power reduction by adapting rate or power for single carrier wireless systems. Mohammad Mohammadnia-Avval, Mohammad Reza Pakravan, Babak Hossein Khalaj |
| 2006 | Truthful application-layer multicast in mesh-based selfish overlays. Wei Zhou, Ke Xu, J. Liu, Chi-Hung Chi |
| 2006 | Unstructured peer-to-peer session over IP using SIP. Khashayar Khavari, Chuen Liang, Ali Tizghadam, Farid Fadaie, Nadeem Abji, Ramy Farha, Alberto Leon-Garcia |
| 2006 | Voice over application-level multicast. Nick Blundell, Norbert Egi, Laurent Mathy |
| 2006 | Wavelength retuning in a WDM mesh network with survivable traffic grooming. Weiwei Hu, Rose Qingyang Hu, Yi Qian |
| 2006 | Wireless intrusion protection system using distributed collaborative intelligence. Amit Sinha, Issam Haddad, Todd Nightingale, Richard Rushing, David Thomas |
| 2006 | Wireless sensor network based model for secure railway operations. Emad Aboelela, William Edberg, Christos Papakonstantinou, Vinod Vokkarane |
| 2006 | dRamDisk: efficient RAM sharing on a commodity cluster. Vassil Roussev, Golden G. Richard III, Daniel Tingstrom |