By Topic

Communications and Networking in China, 2007. CHINACOM '07. Second International Conference on

Date 22-24 Aug. 2007

Filter Results

Displaying Results 1 - 25 of 298
  • Proceedings of the Second International Conference on Communications and Networking in China

    Publication Year: 2007, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):nil2 - nil17
    Request permission for commercial reuse | PDF file iconPDF (572 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • ChinaCom 2007 - Messages from the General Chairs

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • ChinaCom 2007 - Messages from the TPC Chairs

    Publication Year: 2007, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote Speaker

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB)

    Directions for Communications Research, This keynote talk focuses on some of the leading trends in Communication Technology. These include a number of focused trends as exemplified by specific projects that AT&T Shannon Labs is currently pursuing. These include working crossing the areas of: IP & Voice Services Research, the Internet & Network Systems Research, and Informat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker

    Publication Year: 2007, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB)

    EU and the Internet of the Future, The Future Internet will emerge from advances in a range of critical technologies, converging and evolving in parallel, and from market, business and societal evolutions. These developments are driven by a growing and changing demand for user control of content and services, increasing networking of "things", and convergence at networks, devices and services leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steering Committee

    Publication Year: 2007, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007, Page(s):11 - 15
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2007, Page(s): 16
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Agent-based Distributed Cooperative Intrusion Detection System

    Publication Year: 2007, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2317 KB) | HTML iconHTML

    Most of intrusion detection systems nowadays are not really distributed systems which cannot detect the distributed or cooperative attacks effectively. In this paper, an agent-based distributed cooperative model (ADCM) is proposed, which implements cooperative intrusion detection through efficient, normative event messages exchange among logic detection domains (LDD). Some specific detection agent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Distributed System Level Evaluation Platform for Mobile WiMAX

    Publication Year: 2007, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3254 KB) | HTML iconHTML

    In this paper, we introduce a system level evaluation platform based on the Mobile WiMAX system profile defined by WiMAX Forum. In order to satisfy the large computational requirement of the wireless channel simulation, we propose a distributed implementation method which can effectively reduce the simulation time by parallel computation. Moreover, different interfaces are provided in our platform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of Traffic Patterns in Telecommunication Systems

    Publication Year: 2007, Page(s):28 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2854 KB) | HTML iconHTML

    This paper compares new empirical data from mobile and IP telephony with old measurements of the Plain Old Telephony Service (POTS). The results show the impact on traffic patterns from the changes in technology from fixed to mobile phones, reduction in speech quality from fixed phone to mobile and IP phones, changes in tariffs from usage based to flat-rate subscriptions, and introduction of alter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007, Page(s): 33
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • A New Preemption Algorithm for Diffserv-Aware Traffic Engineering in MPLS Networks

    Publication Year: 2007, Page(s):34 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB) | HTML iconHTML

    The preemption policy with three main preemption optimization criteria is proposed in many literatures and the choice of LSPs to be preempted is an NP-complete problem. We propose a heuristic algorithm called B-PREPT to solve the problem. Simulation results indicate that our algorithm has higher choice accuracy than the well-known heuristic algorithm recently cited by many other papers. Moreover, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of Load Balance Improvement in Industrial Networks

    Publication Year: 2007, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1306 KB) | HTML iconHTML

    The network load balance problem in an industrial network is investigated and this problem is equivalent to an optimization problem: the network partition should reduce the inter-network communication time and simultaneously minimize the communication time difference over the sub-networks for the sake of real-time and reliability performance. Simultaneously the switching capability must be respect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Search Algorithm Utilizing High Degree Nodes

    Publication Year: 2007, Page(s):44 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Unstructured Peer-to-Peer networks, such as Gnutella, are popular for certain applications because they do not require centralized directories and precise control over network topology or data placement. However, the network topology and the placement of files in the unstructured P2P networks are largely unconstrained. Hence, it is important to apply efficient search algorithm for locating resourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007, Page(s): 49
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • BGKR: A Novel P2P Network Based on Generalized Kautz and Ring with Constant Congestion

    Publication Year: 2007, Page(s):50 - 55
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    The topological properties of Peer-to-Peer (P2P) overlay networks are critical factors that dominate the performance of these systems. The P2P networks need a topology with arbitrary size and degree, while the Kautz digraph is a topology with good properties such as constant degree and optimal network diameter O(logd N). However, the limitation of the Kautz digraph is its poor degree of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting and Solving Links Overlap to Make Structured P2P Network Topology-Aware

    Publication Year: 2007, Page(s):56 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    Mismatching between overlay and physical network in structured P2P system leads to overlap of links crossed on backbone network, thus it brings link waste and congestion. A method used for detecting and resolving the link overlap problem is proposed in this paper. It introduces TTL as the measurement of distance, and adjusts the routing table of node according to redirect message achieved from TTL... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposition and Provement of A TCP Feature of P2P Traffic- An Example of BitTorrent and Emule

    Publication Year: 2007, Page(s):61 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1382 KB) | HTML iconHTML

    Over the last years,the large number of filesharing applications has resulted in a significant increase of P2P traffic. The P2P (Peer-to-Peer) technology is characterized by no utilization of any servers with centralized functions and the presence of many hosts acting both as servers and clients.The wide use of the P2P application has lead to the rapid growth of network traffic. Thus, the accurate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007, Page(s): 66
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Shifting the Link Weights in Networks

    Publication Year: 2007, Page(s):67 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2660 KB) | HTML iconHTML

    Transport in large networks follows near to shortest paths. A shortest path depends on the topology as well as on the link weight structure, While much effort has been devoted to understand the properties of the topology of large networks, the influence of link weights on the shortest path received considerably less attention. The scaling of all link weights in a graph by a positive number does no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Link Weight Ranges on OSPF Weight Solutions

    Publication Year: 2007, Page(s):72 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Finding a set of optimal link weights for OSPF routing is a NP-hard problem. Many heuristic algorithms have been proposed in the past. In this paper, we study the impact of link weight ranges on OSPF weight solutions. Experiments were conducted on three commonly used types of synthetic networks for a set of link weight ranges. Three heuristic algorithms with different search mechanisms were run in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.