By Topic

Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. 13th International Conference on

Date 11-13 Oct. 2004

Filter Results

Displaying Results 1 - 25 of 183
  • Stochastic modelling of maintaining specified QoS constraints in discrete-time domain

    Publication Year: 2004 , Page(s): 109 - 114
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (702 KB)  

    Quality of service (QoS) is of extreme importance to accommodate the increasingly diverse ranges of services and types of traffic in the Internet, and maintaining the delay at a specified value is a key QoS requirement. In this paper, a two-state Markov-modulated Bernoulli process (MMBP) is set up as our source model. To satisfy some specified delay, we present an analytical model for a discrete-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel Session: "The future of sensor networks: New challenges and innovative approaches

    Publication Year: 2004 , Page(s): 187
    Save to Project icon | Request Permissions | PDF file iconPDF (397 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast rerouting scheme for OSPF/IS-IS networks

    Publication Year: 2004 , Page(s): 47 - 52
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (684 KB) |  | HTML iconHTML  

    Most current backbone networks use link-state protocol, OSPF or IS-IS, as their intra-domain routing protocol. Link-state protocols perform global routing table update to route around the failures. It usually takes seconds. As real-time applications like VoIP emerge in recent years, there is a requirement for a fast rerouting mechanism to route around failures before all routers on the network upd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ForCES protocol design analysis for protection against DoS attacks

    Publication Year: 2004
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (458 KB) |  | HTML iconHTML  

    This work discusses a design analysis for the protection of the ForCES protocol against denial of service (DoS) attacks, which is a key requirement for the ForCES protocol. In order to meet this requirement, the control and data messages in the protocol needs to be separated. The separation scheme consists of: (1) separating the congestion aware, control and data transport connections such as TCP ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of geocast routing protocols for a MANET

    Publication Year: 2004 , Page(s): 213 - 220
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (864 KB) |  | HTML iconHTML  

    This work classifies the current geocast routing protocols of a mobile ad hoc network (MANET) into three categories. We then simulate a typical geocast routing protocol in each category. We performed four studies designed to highlight the various strengths and weaknesses of the protocols: node density, traffic/congestion, mobility, and a combination study examining all three parameters together. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An accounting management system building on network processor

    Publication Year: 2004
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (459 KB)  

    This work presents a high performance, software programmable and low cost accounting management system building on a network processor. In order to achieve this, the hicuts algorithm was also improved to adapt for packet classification in accounting management system. An optimization method was made in order to reduce the IP flow number to enhance the system by dropping the first packet with a SYN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks

    Publication Year: 2004 , Page(s): 31 - 36
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (747 KB) |  | HTML iconHTML  

    Secure group-based communication services are gaining momentum in wireless ad hoc networks (WAHNs). The efficiency and scalability of these services make them suitable for supporting the inherently collaborative computing and communications activities among peer WAHN nodes as well as the growing number of group-based WAHN applications. Key management, which is comprised of dynamic key generation, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Path based routing algorithm for ad hoc networks

    Publication Year: 2004 , Page(s): 37 - 43
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (859 KB) |  | HTML iconHTML  

    In reactive routing protocols for ad hoc networks, the network wide flooding generates a significant amount of traffic overhead. The goal of This work is to reduce this overhead. We propose a path based route discovery scheme which can find a route to the destination with lower overhead than flooding-based route discovery. We also showed that the probability of finding a path to the destination by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application-level QoS comparison of single-stream and multi-stream approaches in a wireless ad hoc network

    Publication Year: 2004 , Page(s): 25 - 30
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (810 KB) |  | HTML iconHTML  

    This work compares the application-level QoS of four schemes for live audio and video streaming in a wireless ad hoc network by simulation. There are two approaches to audio-video transmission: single-stream and multi-stream. The former transmits a single transport stream of interleaved audio and video, while the latter treats the two media as separate transport streams. Each approach has an alter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A location-based routing algorithm for vehicle to vehicle communication

    Publication Year: 2004 , Page(s): 221 - 226
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (746 KB) |  | HTML iconHTML  

    We present a location-based routing algorithm with cluster-based flooding for vehicle to vehicle communication. We consider a motorway environment with associated high mobility and contrast and compare position-based and non-position-based routing strategies, along with a limiting function for flood mechanisms in reactive ad-hoc protocols. The performance of dynamic source routing (DSR) and ad-hoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A restoration software framework for survivable WDM optical networks

    Publication Year: 2004 , Page(s): 11 - 16
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (807 KB) |  | HTML iconHTML  

    Restoration techniques available in the literature have not addressed their performance in terms of significant, multiple objective goals. Some of these methods have shown good performance for a single objective function. However, restoration must consider a number of objective functions. We evaluate existing models and their performance in an attempt to verify their performance and efficacy based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast restoration of signaling packet transportation in WDM networks under multiple failures

    Publication Year: 2004 , Page(s): 5 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (732 KB) |  | HTML iconHTML  

    With the increase of capacity and functionality in WDM networks, the control planes have become more and more important in state monitoring, resource management, and connection maintenance. The capability of fast failure restoration in a control plane not only enables effective network management but also helps efficient recovery of the transport plane. This work presents a signaling network that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)

    Publication Year: 2004
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2004 , Page(s): 0_2
    Save to Project icon | Request Permissions | PDF file iconPDF (3 KB)  
    Freely Available from IEEE
  • Proceedings 13th International Conference on Computer Communications and Networks

    Publication Year: 2004 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (205 KB)  
    Freely Available from IEEE
  • Copyright

    Publication Year: 2004 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Greetings from the General Chair

    Publication Year: 2004 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2004 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (4 KB)  
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2004 , Page(s): v
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • ICCCN 2004 Organizing Committee

    Publication Year: 2004 , Page(s): vi
    Save to Project icon | Request Permissions | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • ICCCN 2004 Technical Program Committee Members

    Publication Year: 2004 , Page(s): vii - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2004 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (4 KB)  
    Freely Available from IEEE
  • ICCCN 2004 Reviewers

    Publication Year: 2004 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2004 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (4 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004 , Page(s): xiii - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (307 KB)  
    Freely Available from IEEE