By Topic

Proceedings of 15th International Conference on Computer Communications and Networks

Date 9-11 Oct. 2006

Filter Results

Displaying Results 1 - 25 of 102
  • [Front cover]

    Publication Year: 2006, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • Proceedings - 15th International Conference on Computer Communications and Networks

    Publication Year: 2006, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2006, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (436 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2006, Page(s): nil3
    Request permission for commercial reuse | PDF file iconPDF (931 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2006, Page(s): nil4
    Request permission for commercial reuse | PDF file iconPDF (887 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICCCN 2006 Organizing Committee

    Publication Year: 2006, Page(s): nil5
    Request permission for commercial reuse | PDF file iconPDF (441 KB)
    Freely Available from IEEE
  • ICCCN 2006 Technical Program Committee Members

    Publication Year: 2006, Page(s):nil6 - nil9
    Request permission for commercial reuse | PDF file iconPDF (2215 KB)
    Freely Available from IEEE
  • ICCCN 2006 Reviewers

    Publication Year: 2006, Page(s):nil10 - nil12
    Request permission for commercial reuse | PDF file iconPDF (1683 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):nil13 - nil17
    Request permission for commercial reuse | PDF file iconPDF (3851 KB)
    Freely Available from IEEE
  • Challenges and Opportunities of Computer and Communication Systems Research

    Publication Year: 2006, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1169 KB)
    Freely Available from IEEE
  • Session1: Denial of Service [breaker page]

    Publication Year: 2006, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • CARE: Enhancing Denial-of-Service Resilience in Mobile Ad Hoc Networks

    Publication Year: 2006, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7915 KB) | HTML iconHTML

    This paper proposes an attack-resilient routing architecture, called cross-layer active re-routing (CARE), for mobile ad hoc networks (MANETs). Different from existing solutions, CARE does not focus on a particular type of attack, but instead takes a fundamentally general approach-it achieves resilience against a wide range of routing disruption Denial- of-Service (DoS) attacks by treating them an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection

    Publication Year: 2006, Page(s):11 - 16
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7892 KB) | HTML iconHTML

    There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion detection systems (IDS), to match the high throughput of today's high-bandwidth networks. Recent research has shown that the vast majority of security solutions deployed today are inadequate for processing traffic at a sufficiently high rate to keep pace with the network's bandwidth. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending Network-Based Services Against Denial of Service Attacks

    Publication Year: 2006, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7883 KB) | HTML iconHTML

    Over the last decade, several value-added services have been proposed for deployment in the Internet. IP multicast is an example of such a service. IP multicast is a stateful service in that it requires routers to maintain state for forwarding multicast data toward receivers. This characteristic makes the service and its users vulnerable to denial-of-service (DoS) attacks. One type of attack aims ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Architecture

    Publication Year: 2006, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Intra-Domain Routing Topology Bandwidth Management Architecture

    Publication Year: 2006, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10804 KB) | HTML iconHTML

    In this paper, we define architecture of a system for managing network resources in a hierarchical OSPF routing domain supporting DiffServ, wherein resources in terms of bandwidth are dynamically allocated among data flows, each traversing the domain from an ingress edge router to an egress edge router. Specifically, we consider a bandwidth management system in a hierarchical routing domain, where... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical Performance Analysis of Network-Processor-Based Application Designs

    Publication Year: 2006, Page(s):33 - 39
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8379 KB) | HTML iconHTML

    Network processors (NP) are designed to provide both performance and flexibility through parallel and programmable architecture, making them superior to general-purpose processors on performance and to hardware-based solutions on flexibility. But NPs also introduce new challenges. It is important to study the limitations of NP architectures so that one can take full advantage of NP resources to ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Livelock Control Mechanisms in a Gigabit Network

    Publication Year: 2006, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7079 KB) | HTML iconHTML

    Networked systems are susceptible to transient overload, which can lead to system crash due to resource exhaustion. In the absence of appropriate mechanisms, a system can enter and persist in a state of livelock during the overload period. This paper presents an evaluation of two mechanisms for livelock control experienced in computers of different capacities in a gigabit network. The first mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast in sensor and ad-hoc networks [breaker page]

    Publication Year: 2006, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • Onroad Vehicular Broadcasting

    Publication Year: 2006, Page(s):49 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6878 KB) | HTML iconHTML

    This paper presents a broadcasting algorithm that considerably reduces the number of retransmissions in applications such as onroad vehicular broadcasting where nodes are assumed to be arranged on a strip. Analysis and simulation results are presented to describe the overhead, coverage and latency characteristics of the algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stateless Broadcasting to support Heterogeneous Radio Ranges in Mobile Ad Hoc Networks

    Publication Year: 2006, Page(s):56 - 62
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8872 KB) | HTML iconHTML

    A MANET (mobile ad hoc network) requires an efficient network-wide broadcasting service in route discovery as well as in many applications. Recently, many broadcasting protocols have been proposed to avoid the well-known broadcast-storm problem, or to provide reliability over wireless broadcast media. However, since it is assumed that all nodes in the network have the same radio ranges (i.e. homog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Heterogeneity on Coverage and Broadcast Reachability in Wireless Sensor Networks

    Publication Year: 2006, Page(s):63 - 67
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5639 KB) | HTML iconHTML

    While most existing research efforts in the area of wireless sensor networks have focused on networks with identical nodes, deploying sensors with different capabilities has become a feasible choice. In this paper, we focus on sensor networks with two types of nodes that differ in their capabilities, and discuss the effects of heterogeneity of sensing and transmission ranges on the network coverag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet services

    Publication Year: 2006, Page(s): 69
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • On the Use of Anycast in DNS

    Publication Year: 2006, Page(s):71 - 78
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10013 KB) | HTML iconHTML

    In this paper, we measure the performance impact of anycast on DNS. We study four top-level DNS servers to evaluate how anycast improves DNS service and compare different anycast configurations. Increased availability is one of the supposed advantages of anycast and we found that indeed the number of observed outages was smaller for anycast, suggesting that it provides a mostly stable service. On ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-Centric End-to-End Abstractions in Next-Generation Networks

    Publication Year: 2006, Page(s):79 - 86
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10143 KB) | HTML iconHTML

    Next-generation network architectures will be governed by the need for flexibility. Heterogeneous end-systems, novel communication abstractions, and security and manageability challenges will require networks to provide a broad range of services that go beyond the simple store-and-forward capabilities of today's Internet. This paper introduces new abstractions for information transfer and data ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.