Proceedings. Eleventh International Conference on Computer Communications and Networks

16-16 Oct. 2002

Filter Results

Displaying Results 1 - 25 of 107
  • Proceedings Eleventh International Conference on Computer Communications and Networks (Cat. No.02EX594)

    Publication Year: 2002
    Request permission for commercial reuse | |PDF file iconPDF (865 KB)
    Freely Available from IEEE
  • The lack of ethics in cyber space: a case for cyber ethics

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (176 KB) | HTML iconHTML

    Summary form only given as follows. The cyber world has become a most important part of our everyday lives. We spend an increasingly significant portion of our lives in it and use it to communicate with friends, acquaintances, loved ones, and business associates. We make use of our computers and Internet connectivity to look for and purchase all kinds of goods and services. We make airline and oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient hybrid key agreement protocol for wireless ad hoc networks

    Publication Year: 2002, Page(s):404 - 409
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (315 KB) | HTML iconHTML

    Secure and efficient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must be implemented. Due to the resource scarcity in wireless networks, the protocols must be communication efficient and need as less computational power as possible. To secure the group broadcasting in wireless net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed media and arts

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (189 KB) | HTML iconHTML

    Summary form only given. The traditional hierarchical view of data, information and knowledge as various stages of (artificial) intelligence sidesteps a significant stage, namely "experience", which is the main concern of artists. With digital multimedia taking a more prominent role in arts and entertainment, we have much more opportunity to create unique experiences, as well as new challenges to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • R and D priorities and challenges for optical networking

    Publication Year: 2002
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (215 KB) | HTML iconHTML

    Summary form only given. Today, the telecommunication industry is experiencing "a nuclear winter". It is a challenging proposition right now to debate research and development (R and D) priorities for optical networking. However, even though the telecommunication market is unsettled today, we need to be ready with appropriate technological solutions to meet the growing bandwidth needs of our infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):647 - 648
    Request permission for commercial reuse | |PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • A new paradigm for intrusion detection systems

    Publication Year: 2002
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (174 KB) | HTML iconHTML

    Summary form only given. The US Army Research Laboratory through its Information Assurance Center (IAC) seeks to evolve and continuously develop an IA capability that sets the Army and DoD standard for protecting computing and communications infrastructure from unauthorized access, illicit exploitation, component damage, and denial of service to authorized users. The IAC has two components, an ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet: what will grow up to be?

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (188 KB) | HTML iconHTML

    Summary form only given, as follows. The Internet is almost 20 years old today (dating from the wide deployment of TCP/IP on the ARPANET in 1983). It is undoubtedly a success, but unarguably still a work in progress. The author makes the case that the Internet is only 0.1% built out today, and could take another 20 years to fully mature. The Internet is at a crossroads today. It will likely contin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth scheduling for multi-channel packet cable telephony

    Publication Year: 2002, Page(s):537 - 542
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (340 KB) | HTML iconHTML

    Cable networks have evolved from offering broadcast services to providing high rate two-way data services. In the next step, cable operators intend to use voice over IP (VoIP) to provide cable telephony services. In a cable network the users are connected to the headend through a cable modem. The headend is responsible for allocating upstream bandwidth to the various cable modems. Each cable modem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of path searching heuristics for multicast QoS routing

    Publication Year: 2002, Page(s):248 - 254
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    Quality of service routing for multicast enables a group member to find and install a branch of the multicast tree that can meet its QoS constraints. The most promising protocols in this area use receiver-oriented path searching heuristics to find feasible routes. In this paper, we examine the performance of the path searching heuristics used by these protocols, to determine which techniques are t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient scheme to remove crawler traffic from the Internet

    Publication Year: 2002, Page(s):90 - 95
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (259 KB) | HTML iconHTML

    We estimate that approximately 40% of current Internet traffic is due to Web crawlers retrieving pages for indexing. We address this problem by introducing an efficient indexing system based on active networks. Our approach employs strategically placed active routers that constantly monitor passing Internet traffic, analyze it, and then transmit the index data to a dedicated back-end repository. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic programming approach for optimal scheduling policy in wireless networks

    Publication Year: 2002, Page(s):530 - 536
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (325 KB) | HTML iconHTML

    We discuss scheduling policies in wireless networks with fading channels. A utility function that takes both the communication throughput and the transmission delay into account is defined. A dynamic programming optimization method is used to obtain the optimal scheduling policy which explores the channel dynamics and gets a reasonable trade-off between the communication throughput and the packet ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AKMP: an adaptive key management protocol for secure multicast

    Publication Year: 2002, Page(s):190 - 195
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (396 KB) | HTML iconHTML

    IP multicast is increasingly used as an efficient communication mechanism for group-oriented applications on the Internet. This success urged the development of security mechanisms for that communication model. A common drawback of the proposed solutions is that they do not take into consideration the dynamicity of group members. This leads to inefficient solutions for real multicast sessions. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blocking probability in WDM switching networks with limited wavelength conversion

    Publication Year: 2002, Page(s):454 - 459
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (324 KB) | HTML iconHTML

    We study the benefits of wavelength conversion in all-optical WDM switching networks. In particular, we focus on investigating network performance improvement by using the more realistic limited wavelength conversion. We present an analytical model for calculating the blocking probability of WDM switching networks with limited wavelength conversion and validate the model through simulations. The a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lantern-tree-based QoS multicast protocol for wireless ad-hoc networks

    Publication Year: 2002, Page(s):242 - 247
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (739 KB) | HTML iconHTML

    In this paper, we propose a lantern-tree-based QoS multicast protocol with a reliable mechanism for wireless ad-hoc networks, where the MAC sublayer adopts the CDMA-over-TDMA channel model. In this paper, we identify a lantern-tree for developing an on-demand QoS multicast protocol to satisfy certain bandwidth requirements from a source to a set of destination nodes. The lantern-tree serves as the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations for scheduling and servicing events using a calendar structure

    Publication Year: 2002, Page(s):30 - 33
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (318 KB) | HTML iconHTML

    Networks are supposed to support multiple service categories that include real-time services and best-effort services. In both types of applications, it is important to differentiate between the requirements of different streams, and allow for an appropriate distribution of resources among them. Work-conserving disciplines may be implemented with the use of queue or scheduling calendars. Since cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reliable protocol for processing within IP-routed networks

    Publication Year: 2002, Page(s):84 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (274 KB) | HTML iconHTML

    The task of an Internet router is to scan the IP headers for the destination address and make a routing decision based on the information. If the processing capability of a router is enhanced to support computation on a datagram, some of the host computation may be delegated to the intermediate routers. The instructions about how to do the processing may be provided by the end hosts. We propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of flow and QOS control in multicast routing

    Publication Year: 2002, Page(s):514 - 517
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (300 KB) | HTML iconHTML

    Current works on QOS-routing allow flow and QOS control to be exercised on multicast paths after an underlying routing protocol (e.g., DVMRP and CBT) sets up these paths. The 'QOS-control-after-routing' paradigm limits the ability of routers to provide cost-efficient routing (in a network-wide sense) because they can explore only those paths already set up even if more cost-efficient alternate pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing metrics for best-effort traffic

    Publication Year: 2002, Page(s):595 - 598
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (266 KB) | HTML iconHTML

    Most of the QoS routing research in the literature attempts to increase the performance of QoS traffic without explicitly considering the performance of the best-effort traffic in the network. However, although the trend in the development and use of real-time multimedia applications is on the rise, traditional data applications are still expected to be a dominant percentage of the Internet traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A self-correcting neighbor protocol for mobile ad-hoc wireless networks

    Publication Year: 2002, Page(s):556 - 560
    Cited by:  Papers (7)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (258 KB) | HTML iconHTML

    Mobile wireless ad-hoc networks lack some basic abilities taken for granted in wired networks, such as the ability to know adjacent nodes. We present a neighbor discovery protocol, with particular application to broadcast flooding. The neighbor exchange protocol (NXP) has two main improvements over simple periodic broadcast schemes: (1) it only sends Hello packets when necessary to maintain topolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully power-aware and location-aware protocols for wireless multi-hop ad hoc networks

    Publication Year: 2002, Page(s):608 - 613
    Cited by:  Papers (10)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (275 KB) | HTML iconHTML

    A mobile ad hoc network (MANET) is one consisting of a set of mobile hosts which can operate independently without infrastructure base stations. Power saving is a critical issue for MANET since most mobile hosts will be operated by battery power. In this paper, we address the power-saving issue for IEEE 802.11-based MANET from several protocol layers, including physical, MAC, and network layers. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software framework for non-repudiation service in electronic commerce based on the Internet

    Publication Year: 2002, Page(s):182 - 189
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (424 KB) | HTML iconHTML

    We propose a software framework for non-repudiation service in e-commerce (electronic commerce) on the Internet. The proposed software framework is an explicit security framework for notary service. In the framework we propose a systematic design methodology that provides a security class concept. Our framework can be differentiated from others. First, unlike other frameworks, it is interested in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability of CIOQ switches with finite buffers and non-negligible round-trip time

    Publication Year: 2002, Page(s):444 - 448
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (379 KB) | HTML iconHTML

    We propose a systematic method to determine the lower bound for internal buffering of practical CIOQ (combined input-output queued) switching systems. We introduce a deterministic traffic scenario that stresses the global stability of finite output queues. We demonstrate its usefulness by dimensioning the buffer capacity of the CIOQ under such traffic patterns. Compliance with this property maximi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed control scheme for causality and media synchronization in networked multimedia games

    Publication Year: 2002, Page(s):144 - 149
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (420 KB) | HTML iconHTML

    This paper proposes a distributed control scheme for causality and media synchronization in networked games where plural media streams such as computer data, voice, and video are dealt with together. According to the network load, the scheme adaptively preserves the temporal and causal relationships which exist among the media streams. It also performs group (or inter-destination) synchronization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multilevel hierarchical distributed IP mobility management scheme for wide area networks

    Publication Year: 2002, Page(s):480 - 484
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (372 KB) | HTML iconHTML

    Hierarchical Mobile IPv6 (HMIPv6) has been proposed as one solution to accommodate the frequent movements of mobile terminals (MTs) in IP-based mobile communication networks. HMIPv6 utilizes a mobility anchor point (MAP) that allows the network to manage the mobility of MTs without causing any overflow of outgoing and incoming messages beyond the network perimeter. However, there is a problem in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.