By Topic

Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)

Date 23-28 Oct. 2005

Filter Results

Displaying Results 1 - 25 of 101
  • Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - Title Page

    Publication Year: 2005, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - Table of contents

    Publication Year: 2005, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Advisory Committees

    Publication Year: 2005, Page(s):xiv - xxii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s):xxiii - xxv
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • Designing Scalable Routers with a New Switching Architecture

    Publication Year: 2005, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Today most routers consist of line cards and centralized switching fabrics. It is now more and more difficult to increase the speed of line cards. Each generation of routers consume more power, and it gets more difficult to package a router in one rack of equipment. The research on routers shifts from single-rack systems to multi-rack ones. Most switches in routers today reside out of line cards. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient round-robin algorithm for combined input-crosspoint-queued switches

    Publication Year: 2005, Page(s): 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    The combined input-crosspoint-queued (CICQ) crossbar switch is becoming attractive because of the simplicity of scheduling. Although the previously proposed round-robin algorithms achieves 100% throughput asymptotically under uniform Bernoulli i.i.d. traffic, these algorithms do not have a satisfactory performance under nonuniform traffic. In this paper, we propose a dual round-Robin algorithm for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Path-Diversity Protocol for the Invocation of Distributed Transactions over the Web

    Publication Year: 2005, Page(s): 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    The notion of path-diversity has been widely used in the context of content delivery networks (CDNs) to improve system responsiveness by leveraging inherent features of multi-hop networks to reduce the likelihood to incur link congestions or failures. In this work we address the issue of how to exploit path-diversity in the context of application delivery networks (ADNs), namely the evolution of C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chord6: IPv6 Based Topology-Aware Chord

    Publication Year: 2005, Page(s): 4
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Chord, in its original design, does not take into account physical network topology, thus resulting in high routing latency and low efficiency. As the entire Internet is being currently upgraded from IPv4 to IPv6 worldwide, we devise a smart scheme to exploit the IPv6 address hierarchical feature, so as to construct an efficient version of Chord dubbed Chord6. Simulation results have shown that ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emulator Implementation of Service Scenario Description Framework for Home Networked Appliances

    Publication Year: 2005, Page(s): 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A home network service middleware called "UKARI-Kernel" has been proposed for distributed and collaborative networked appliances and networked sensors. A home network service can be established by the middleware using distributed function elements on the networked appliances. The middleware uses a service scenario description framework on the basis of BPEL, an XML language to define business proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic-partitioning Approaches to Grooming Ring Networks

    Publication Year: 2005, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Traffic grooming has become an increasingly important area in optical networking research in recent years. Very recently, a min-max approach to network cost optimization has emerged as a new focus area. In this cost model, it is assumed that different network nodes will be provisioned with similar opto-electro-optic (OEO) equipment; hence an objective seeking to minimize the maximum OEO capability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification

    Publication Year: 2005, Page(s): 7
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Packet classification is crucial to the implementation of several advanced services that require the capability to distinguish traffic in different flows, such as firewalls, intrusion detection systems, and many QoS implementations. Although hardware solutions, such as TCAMs, provide high search speed, they do not scale to large rulesets. Instead, some of the most promising algorithmic research em... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Scalability and Robustness of NQOSP Algorithm in Dynamic Traffic's Network

    Publication Year: 2005, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (857 KB) | HTML iconHTML

    This paper improves scalability and robustness of our earlier developed approach based on adaptive algorithm for packet routing using reinforcement learning called N Q-routing optimal shortest paths (NQOSP). In contrast with other algorithms that are also based on reinforcement learning (RL) methods, the N Q-routing optimal shortest paths is based on a multi-paths routing technique combined with t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study on the Extensibility of Network Processor Based Systems

    Publication Year: 2005, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    As the use of Internet become increasingly popular, diverse range of network applications which perform different functions are needed to serve user's requirements. However, network system developers face problem to incorporate these new services in their products since the conventional network equipment architectures are monolithic, inflexible, and costly and induce long development time. Thus, m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Transmission Scheme Based on Rician Channel k-factor for EGPRS Systems

    Publication Year: 2005, Page(s): 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    To utilize the spectrum efficiently, nine modulation and coding schemes had been specified in the EGPRS standard. This paper proposes a new closed-loop link adaptation by selecting the transmission mode according to the Rician channel k-factor. The proposed link adaptation incorporates only three identical modulated schemes due to the considerations of hardware complexity and implementation feasib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multistage Quasi-Orthogonal Minimum Output Energy Multiuser Detector Analysis for Convolutionally Coded CDMA Systems in Frequency-Selective Fading

    Publication Year: 2005, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    The paper presents the performance analysis of the multistage quasi-orthogonal minimum output energy (QOMOE) detector for a convolutionally coded synchronous CDMA systems in frequency selective fading environment. The QOMOE detector minimizes the output variance with respect to the component equivalent to the quasi-orthogonal component to the desired user’s signature waveform, then the soluti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach for the Construction of ALM Trees using Layered Coding

    Publication Year: 2005, Page(s): 12
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    This paper presents a novel approach for efficient tree construction in ALM (application layer multicast) using layered video coding. This system is suitable for the users in heterogeneous environment such as xDSL and CATV, where upload and download speeds are different. We point out some problems in these environment of the ALM and show their solutions at two stages. First, we redefine the "degre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Solution to Improve the TCP Performance in the Presence of Handoffs in Wireless IP Networks

    Publication Year: 2005, Page(s): 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    TCP is a protocol which performs well with networks that are physically linked and hosts are stationary. However, TCP/IP protocols work independently of the physical layer. In wireless environments, mobile hosts are subject to change their attachment point during communication. When a user moves towards a new network domain during communication, the TCP packet loss is increased. Our approach provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A TCP-Friendly Stateless AQM Scheme for Fair Bandwidth Allocation

    Publication Year: 2005, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB) | HTML iconHTML

    Queue management, bandwidth share, and congestion control are very important to both robustness and fairness of the Internet. In this article, we investigate the problem of providing a fair bandwidth allocation to those flows that share congested link in a router. A new TCP-friendly router-based AQM (active queue management) scheme, termed WARD, is proposed to approximate the fair queueing policy.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reno Friendly TCP Westwood based on Router Buffer Estimation

    Publication Year: 2005, Page(s): 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    TCP Reno versions are widely used in current network, however it has been actualized that their throughput deteriorates in high-speed network and wireless environments. To overcome these problems of TCP Reno versions, a number of protocols have been proposed. In these researches, friendliness with TCP Reno becomes important. TCP Westwood is an example that is based on end-to-end bandwidth estimate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Transport Layer Approach to Handover in IP Networks

    Publication Year: 2005, Page(s): 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    In this paper we scrutinize the applicability of network layered mobility schemes, in particular mobile IP, within a mobile environment. We argue that a transport layer solution is better suited to support handover mechanisms, because not only will it reduce the overall complexity of the handover process but also it will permit applications to take advantage of influencing handover management. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Preamplifier on Timing Recovery in Magnetic Recording Channels

    Publication Year: 2005, Page(s): 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    We study the effect of the preamplifier cutoff frequency on the timing recovery performance of perpendicular magnetic recording systems with independent and identically distributed (IID) random input bits as well as run length-limited (RLL) encoded inputs. We observe that a larger cutoff frequency has a detrimental effect on the system performance. When using an RLL encoder with an IID input we ob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive Route Maintenance and Overhead Reduction for Application Layer Multicast

    Publication Year: 2005, Page(s): 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    The purpose of this study is to maintain efficient backup routes for restoring overlay trees. In most conventional methods, after a node leaves the trees, its children start searching for a new parent. In this reactive approach, it takes a lot of time to find a new parent. In this paper, we propose a proactive approach to find a new parent over the overlay trees before the current parent leaves. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTnet: a distributed real-time protocol for broadcast-capable networks

    Publication Year: 2005, Page(s): 18
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    RTnet is a distributed real-time network protocol, to be used on fully-connected local area networks with a broadcast capability. It supports on-the-fly addition and removal of network nodes, resource-lavish and resource-lean devices, streaming real-time and regular non-realtime traffic. It allows the use of standard real-time scheduling paradigms to control network traffic, allows dynamic schedul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.