Proceedings. Eleventh International Conference on Computer Communications and Networks

16-16 Oct. 2002

Filter Results

Displaying Results 1 - 25 of 107
  • Proceedings Eleventh International Conference on Computer Communications and Networks (Cat. No.02EX594)

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (865 KB)
    Freely Available from IEEE
  • The lack of ethics in cyber space: a case for cyber ethics

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Summary form only given as follows. The cyber world has become a most important part of our everyday lives. We spend an increasingly significant portion of our lives in it and use it to communicate with friends, acquaintances, loved ones, and business associates. We make use of our computers and Internet connectivity to look for and purchase all kinds of goods and services. We make airline and oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient hybrid key agreement protocol for wireless ad hoc networks

    Publication Year: 2002, Page(s):404 - 409
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Secure and efficient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must be implemented. Due to the resource scarcity in wireless networks, the protocols must be communication efficient and need as less computational power as possible. To secure the group broadcasting in wireless net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed media and arts

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Summary form only given. The traditional hierarchical view of data, information and knowledge as various stages of (artificial) intelligence sidesteps a significant stage, namely "experience", which is the main concern of artists. With digital multimedia taking a more prominent role in arts and entertainment, we have much more opportunity to create unique experiences, as well as new challenges to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • R and D priorities and challenges for optical networking

    Publication Year: 2002
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Summary form only given. Today, the telecommunication industry is experiencing "a nuclear winter". It is a challenging proposition right now to debate research and development (R and D) priorities for optical networking. However, even though the telecommunication market is unsettled today, we need to be ready with appropriate technological solutions to meet the growing bandwidth needs of our infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):647 - 648
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • A new paradigm for intrusion detection systems

    Publication Year: 2002
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Summary form only given. The US Army Research Laboratory through its Information Assurance Center (IAC) seeks to evolve and continuously develop an IA capability that sets the Army and DoD standard for protecting computing and communications infrastructure from unauthorized access, illicit exploitation, component damage, and denial of service to authorized users. The IAC has two components, an ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet: what will grow up to be?

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Summary form only given, as follows. The Internet is almost 20 years old today (dating from the wide deployment of TCP/IP on the ARPANET in 1983). It is undoubtedly a success, but unarguably still a work in progress. The author makes the case that the Internet is only 0.1% built out today, and could take another 20 years to fully mature. The Internet is at a crossroads today. It will likely contin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient broadcast with forward node set in clustered mobile ad hoc networks

    Publication Year: 2002, Page(s):398 - 403
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    The clustered architecture of a mobile ad hoc network (MANET) has the virtue of keeping the node information locally which is suitable for scalability. Reducing broadcast redundancy can avoid the broadcast storm problem and save scarce resources such as bandwidth and energy. We propose an approach that chooses a subset of nodes, called forward node set, to relay the broadcast packet. Each clusterh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks

    Publication Year: 2002, Page(s):392 - 397
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    We can control the topology of a multi-hop wireless network by varying the transmission power at each node. The life-time of such networks depends on battery power at each node. This paper presents a distributed fault-tolerant topology control algorithm for minimum energy consumption in these networks. More precisely, we present algorithms which preserve the connectivity of a network upon failing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COPAS: dynamic contention-balancing to enhance the performance of TCP over multi-hop wireless networks

    Publication Year: 2002, Page(s):382 - 387
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Most studies on TCP over multi-hop wireless ad hoc networks have only addressed the issue of performance degradation due to temporarily broken routes, which results in TCP inability to distinguish between losses due to link failures or congestion. This problem tends to become more serious as network mobility increases. We tackle the equally important capture problem to which there has been little ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement of passive cluster based routing protocol for mobile adhoc networks

    Publication Year: 2002, Page(s):376 - 381
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB) | HTML iconHTML

    On-demand routing protocols in mobile ad hoc networks use a process called flooding to seek the route to a destination computer. This process usually incurs a very large overhead. We examine a protocol called passive cluster-based routing protocol (PCBRP). This protocol when applied on top of any of the current routing protocols provides substantial advantages in the form of reduced overhead durin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location query based on moving behavior

    Publication Year: 2002, Page(s):268 - 273
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    In a mobile environment, a decision maker would usually like to query times, locations, and moving behaviors of certain mobile terminals. For example, a mobile transaction would like to know where is the next cell of its mobile clients and the probabilities that the mobile clients will move to the cells so that it could reserve appropriate channels for them. As a result, tracking the changing time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent geographic load balance scheme for mobile cellular networks

    Publication Year: 2002, Page(s):348 - 353
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    In this paper, we investigate a novel geographic load balance scheme, which intelligently changes cellular coverage according to the geographic traffic distribution in real time. The performance of the whole cellular network can be improved by contracting the antenna pattern around the source of peak traffic and expanding adjacent cells coverage to fill in the coverage loss. Our previous global op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic-based bandwidth allocation for DOCSIS cable networks

    Publication Year: 2002, Page(s):586 - 590
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    We explore an approach for bandwidth allocation for the centralized MAC protocol employed by DOCSIS (data over cable service interface specification) compliant cable networks. The proposed approach is based on the statistics of the source traffic models. It aims at achieving low excess bandwidth while still offering delays that are acceptable from the point of view of the application's QoS require... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating convergence properties of BGP

    Publication Year: 2002, Page(s):124 - 129
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    We present a simple BGP simulator that is used for testing convergence properties of inter-domain routing. The discrete-event driven simulator contains a high-level abstraction model of the BGP protocol. The purpose is to perform simulations to examine the complexity of routing information exchange and to test different possible reasons for delayed convergence of BGP routing. We have simulated eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel MAC layer protocol for space division multiple access in wireless ad hoc networks

    Publication Year: 2002, Page(s):614 - 619
    Cited by:  Papers (34)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Recently, MAC protocols using directional antennas for wireless ad hoc networks that are based on and similar to IEEE 802.11 type WLAN have been proposed. These protocols, however, are unable to attain substantial performance improvements because they do not enable the nodes to perform multiple simultaneous transmissions/receptions. In this paper, we propose a MAC layer protocol that exploits spac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of proxy partial caching using HTTP for supporting interactive video and cache consistency

    Publication Year: 2002, Page(s):216 - 221
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (502 KB) | HTML iconHTML

    Proxy partial caching, e.g. segment-based proxy caching or proxy prefix caching, partitions the object into nonoverlapping pieces. The proxy cache then treats each piece as an individual file when performing caching and replacing. Upon receipt of request to the object, the proxy cache delivers the cached portion to the client immediately to mask the start-up delay. However, two architectural chall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forward-only uni-directional routing

    Publication Year: 2002, Page(s):370 - 375
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Wireless computer networks have properties that differ significantly from traditional wireline networks. One prominent difference is the presence of unidirectional channels. That is, it may be possible for a computer p to send a message to a neighboring computer q, but it may not be possible for computer q to send a message to computer p. This introduces significant changes in routing protocols. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic network scenario emulation tool

    Publication Year: 2002, Page(s):262 - 267
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Comparative performance measurements of distributed applications and network protocols require the availability of appropriate network environments. Network emulation approaches offer a flexible way to mimic the properties of a variety of networks. Existing emulation tools work either with centralized real-time simulation components, limiting the scenario size and maximum traffic, or focus on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TIP6: a transition mechanism for implementing mobile networks

    Publication Year: 2002, Page(s):342 - 347
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    The use of the IPv4 protocol in mobile networks has considerably increased the number of hosts that can potentially access the global Internet. Because the IPv4 address space is almost exhausted, the pressure for more IP addresses has increased again the attention on the IPv6 protocol. Because the transition from IPv4 to IPv6 is supposed to gradually happen, IETF is publishing a set of transition ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study on the coherent approaches to cooperation between TCP and ATM congestion control algorithms

    Publication Year: 2002, Page(s):580 - 585
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Numerous studies have indicated that ATM available bit rate (ABR) service can provide low-delay, fairness, and high throughput, and can handle congestion effectively inside the ATM network. However, network congestion is not really eliminated but rather it is pushed out to the edge of the ATM network, packets from TCP sources competing for the available ATM bandwidth are buffered in the routers or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic grooming for minimizing wavelength usage in WDM networks

    Publication Year: 2002, Page(s):460 - 465
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    We consider the traffic grooming problem on general topology WDM networks. The problem is: given a set of t connections and their routes, and the grooming factor g, to find an optimal wavelength assignment and grooming such that the number of wavelengths required in the network is minimized. We first formulate this problem as an integer linear programming problem, and then propose a heuristics met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying objective perceptual quality assessment methods in network performance modeling

    Publication Year: 2002, Page(s):116 - 123
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    A quantitative approach is developed for modeling and analyzing objectively the perceptual performance of computer-communication networks and computer systems that involve real-time human interaction and communication with real-time streamed signals such as audio, speech, or video. The proposed 'perceptual analysis' method is based on augmenting traditional system performance models with the incor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of multi-rate traffic in WDM grooming networks

    Publication Year: 2002, Page(s):296 - 301
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    Traffic grooming in optical networks employing wavelength division multiplexing has gained prominence due to the prevailing sub-wavelength capacity requirements of users. One approach to achieving wavelength sharing is through time division multiplexing. Connection requests can have a varying number of time slot requirements. Analytical modeling for computing the blocking performance of establishi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.