By Topic

10th IEEE Symposium on Computers and Communications (ISCC'05)

Date 27-30 June 2005

Filter Results

Displaying Results 1 - 25 of 157
  • Proceedings. 10th IEEE Symposium on Computers and Communications

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (254 KB)
    Freely Available from IEEE
  • 10th IEEE Symposium on Computers and Communications - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • 10th IEEE Symposium on Computers and Communications - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 10th IEEE Symposium on Computers and Communications - Table of contents

    Publication Year: 2005, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2005, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2005, Page(s):xvii - xix
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2005, Page(s):xxii - xxxii
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2005, Page(s):xxxiii - xxxvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth guaranteed routing for ad-hoc networks with interference consideration

    Publication Year: 2005, Page(s):3 - 9
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path width on top of the conflict-graph based interference model, and present the ad-hoc shortest widest path (ASWP) routing problem in an ad-hoc network context. We propose a distributed algorithm to address the ASWP problem. Ado... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CACMAN: a framework for efficient and highly available CA services in MANETs

    Publication Year: 2005, Page(s):10 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    MANET applications and services pose many interesting challenges due to their unique features. Specifically, security is getting a lot of attention in every aspect of MANETs due to their inherent vulnerability to attacks. Threats exist in every layer of the MANET stack, and different solutions have been adapted for each security problem. Another problem for MANETs is availability, and adding more ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving performance of a real ad-hoc network by tuning OLSR parameters

    Publication Year: 2005, Page(s):16 - 21
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    A key element for MANET performance is the routing protocol. Surprisingly, little effort has been devoted up to now to analyzing the impact of routing protocol parameter settings on MANET performance. We define and study in detail the route change latency (RCL) after link failures, a critical performance metric in a non-static ad-hoc scenario, and its dependence on routing protocol parameter setti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power efficient connected topologies in ad-hoc networks

    Publication Year: 2005, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Power efficient topologies in an ad-hoc network can reduce battery usage and increase the lifetime of a network. Topology control algorithms including a local minimum spanning tree (LMST), distributed relative neighbourhood graph (DRNG) and K-Neigh graphs are computed by using the location or the distance information of the network nodes. Inaccurate distance or location information can lead to dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized broadcast incremental power protocol for wireless ad hoc networks

    Publication Year: 2005, Page(s):28 - 33
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    As broadcasting is widely used for miscellaneous maintenance operations in wireless ad hoc networks, where energy is a scarce resource, an efficient broadcasting protocol is of prime importance. One of the best known algorithm, named BIP (broadcast incremental power), constructs a spanning tree rooted at a given node. This protocol offers very good results in terms of energy savings, but its compu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reputation-based trust mechanism for ad hoc networks

    Publication Year: 2005, Page(s):37 - 42
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities for this emerging networking paradigm. Usually, security in ad hoc networks is handled through authentication and encryption. This can be considered as a first line of defense, however, this remain inefficient against some o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing and evaluating lightweight solutions for replica dissemination and retrieval in dense MANETs

    Publication Year: 2005, Page(s):43 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    There is an emerging market interest in service provisioning over dense mobile ad-hoc networks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and university campuses, where a high number of mobile wireless peers can autonomously cooperate without exploiting statically deployed network infrastructures. We claim that it is possible to exploit the high node population of d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TPA: a transport protocol for ad hoc networks

    Publication Year: 2005, Page(s):51 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Several previous works have shown that TCP exhibits poor performance in mobile ad hoc networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly different way from traditional wired networks, like the Internet, for which TCP was originally designed. In this paper we propose a novel transport protocol - named TPA - specifically tailored to the characteristics of the MA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility changes anonymity: mobile ad hoc networks need efficient anonymous routing

    Publication Year: 2005, Page(s):57 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Introducing node mobility into the network also introduces new anonymity threats. Nevertheless, this important change of the concept of anonymity has not been studied in state-of-art network security research. This paper presents the needed study. Then we show that anonymous routing in mobile networks has great impact on routing performance. We calls for the attention to devise new and efficient a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytical study of direct and indirect signaling for mobile IPv6 in mobile-to-mobile communications

    Publication Year: 2005, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    The mobile IPv6 handover process consists of three major stages: movement detection, duplicate address detection and binding signaling. Most of the research efforts for optimizing the handover process focuses on minimizing the delays caused by the first two stages. The delay introduced by binding signaling is largely ignored since the correspondent node is assumed to be stationary. However, this d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding current IPv6 performance: a measurement study

    Publication Year: 2005, Page(s):71 - 76
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Much work has been done on IPv6 standards and testbeds deployment. However, little is known about the performance of the real IPv6 Internet, especially from the perspective of end users. In this paper, we present a measurement study of current IPv6 performance conducted from CERNET. We study 585, 680 packet-level traces with 133,340 million packets collected from 936 IPv4/IPv6 dual-stack Web serve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IntServ6: an approach to support QoS over IPv6 networks

    Publication Year: 2005, Page(s):77 - 82
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This paper proposes an approach to support end-to-end quality of service over IPv6 networks. In our solution, IPv6 flow labels are used to give better performance into the process of packet classification on network routers. In order to evaluate our proposal, a router model is obtained and it is compared with other technologies as IntServ and MPLS. As result, we obtain a solution with benefits of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 conformance and interoperability testing

    Publication Year: 2005, Page(s):83 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The fear of incompatibility issues between legacy IPv4 systems and new IPv6 implementations can delay the migration towards a full IPv6 native Internet. Network engineers need to ensure that heterogeneous IPv6 devices behaves consistently to the IPv6 specifications and correctly enterprise in a multi-vendor environment. This paper analyzes IPv6 conformance testing, a set of rigorous test methodolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient QoS routing for differentiated services EF flows

    Publication Year: 2005, Page(s):91 - 96
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Expedited forwarding (EF) is the differentiated services class of service that provides high quality transmission with node bounded delay. Nevertheless, in order to obtain a bounded network delay it is necessary to compute a route that meets the required end-to-end delay. Therefore, we study the requirements (bandwidth, buffer and delay) for a new EF connection. As detailed in the paper, with thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two routing algorithms for failure protection in IP networks

    Publication Year: 2005, Page(s):97 - 102
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Future IP networks demand increased resilience. We present two new routing algorithms which provide at each node two or more next hops towards every destination, so that nodes can react quickly without further signaling to link or node failures. We derive formal requirements of this approach on the routing graphs, describe and analyze two algorithms and introduce a new link weight metric dependent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Core based multipath routing in DiffServ networks

    Publication Year: 2005, Page(s):103 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    DiffServ network model, which is a scalable framework for providing quality of service to applications, defines multiple service classes each with different level of priority in queuing of network routers. Recent study shows that the global treatment of premium class as the most prioritized service class strongly affects the performance of low priority classes. This negative impact becomes more ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.