Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2007 16th International Conference on Computer Communications and Networks

13-16 Aug. 2007

Filter Results

Displaying Results 1 - 25 of 241
  • [Front cover]

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1286 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2007, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message From the Technical Program Chair

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (171 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshops Co-Chairs

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE ICCCN 2007 Organizing Committee

    Publication Year: 2007, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • IEEE ICCCN 2007 Technical Program Committee

    Publication Year: 2007, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Technical Program Committee Members

    Publication Year: 2007, Page(s):ix - xv
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Managing Digital Objects on the Internet

    Publication Year: 2007, Page(s):xvi - xxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    All types of information may be structured as digital objects. These may be subject to rights, require privacy or demand security. Some may be inaccessible without permission (eg. Behind firewalls) may move from place to place, or exist at multiple locations. Some may need to be accessible for very long period of time. An overall framework in which to address these issues will be presented and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Challenges in Cognitive Radio Networks

    Publication Year: 2007, Page(s): xxviia
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB)

    The cognitive radio technology will allow a group of potential users to identify and access available spectrum resources provided that the interference to users for whom the band has been licensed is kept below a prescribed level. This research area is at an early stage because various research challenges have to be addressed and solved. In this talk we present an overview of some research issues ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges and Opportunities in Video Transmission

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB)

    Supporting video communication over lossy channels such as wireless networks and the Internet is a challenging task due to the stringent quality of service (QoS) required by video applications and the many channel impairments. Two important QoS characteristics for video are the degree of signal distortion and the transmission delay. Another important consideration is the cost associated with trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Control: A Key to Stress-Resilient Internet Services

    Publication Year: 2007, Page(s): xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB)

    Today's Internet services are largely vulnerable to flash crowds-like DDoS attacks because the visits in such attacks often bear much resemblance to normal accesses and most of them cannot be detected with certainty. Current same-service-to-all models can hardly protect the interests of legitimate clients from the interference of suspicious traffic. Application-level quality control in edge server... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE ICCCN 2007 Distinguished Invited Talk

    Publication Year: 2007, Page(s): xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB)

    Provides an abstract of the invited presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE ICCCN 2007 Advanced Panels

    Publication Year: 2007, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • IEEE ICCCN 2007 Best Paper Award Nominees

    Publication Year: 2007, Page(s): xxviib
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • IEEE ICCCN 2007 Chairs Recommended Papers

    Publication Year: 2007, Page(s):xxviic - xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Provides an abstract of the presentations and a brief professional biography of the presenters. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2007, Page(s):xxviid - xxxviii
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • A New Perspective of Cross-layer Optimization for Wireless Communication over Fading Channel

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    In most designed adaptive modulation and coding (AMC) schemes the data link layer transmission rate is adapted only against physical layer channel variation. The highly fluctuating queuing process at the data link layer is not fully investigated. In this study, we first research on more advanced AMC mode selection algorithms and then propose a two-dimensional cross- layer optimization scheme. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic Scheduling for Delay Sensitive Flows in Wireless Networks

    Publication Year: 2007, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    We present an "opportunistic" scheduling policy with the objective of improving delay performance for time-sensitive users in wireless networks. Since packet delay depends on both resource allocation and time-varying capacity of wireless channels, we introduce a search radius (SR) into the framework of packet fair queueing (PFQ) and employ maximum relative SNR (Max-rSNR) as scheduling rule with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computationally Efficient Cross-Layer Algorithm for Fair Dynamic Bandwidth Allocation

    Publication Year: 2007, Page(s):13 - 18
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2729 KB) | HTML iconHTML

    The problem of dynamic bandwidth allocation (DBA) is inherent to systems that employ bandwidth on demand (BoD). An important issue in such systems is to be able to react efficiently to the always-changing traffic requests of users. Moreover, it is realistic to assume large populations sharing system resources and thus efficient methods to distribute bandwidth are mandatory. Further desirable syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructure for Cross-Layer Designs Interaction

    Publication Year: 2007, Page(s):19 - 25
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    The current system design of mobile ad hoc networks (MANET), derived from their traditional fixed counterparts, cannot fully meet the requirements inherent to the dynamic nature of such networks. Cross-layer (CL) designs, a modification of the classic protocol stack, are envisioned as a solution for this problem. Many CL design approaches are proposed, each for a different optimization purpose. Mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Unified Software Architecture to Enable Cross-Layer Design in the Future Internet

    Publication Year: 2007, Page(s):26 - 32
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    While research on cross-layer network optimization has been progressing, useful implementations have been lagging because the current Internet architecture does not accommodate cross-layering gracefully. As part of our FIND project, we propose a software architecture for the future Internet that is designed to accommodate such interactions. We present a conceptual overview as well as high level so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized detection of k-connectivity in wireless ad hoc, actuator and sensor networks

    Publication Year: 2007, Page(s):33 - 38
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1239 KB) | HTML iconHTML

    Ad hoc, actuator and sensor wireless networks normally have critical connectivity properties before becoming fault intolerant. Existing algorithms for testing k-connectivity are centralized. In this article, we introduce localized algorithms for testing A-connectivity. In localized protocols, each node makes its own decision based on the information available in its local neighborhood. In the firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference Mitigation Using Spectrum Sensing

    Publication Year: 2007, Page(s):39 - 44
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    The concept of spectrum sensing is in the broad sense, the ability to detect and interpret other signals in the band and take appropriate actions by implementing adaptive techniques in the MAC layer in addition to traditional interference cancellation techniques applied in the PHY layer. In this paper we present algorithms to detect interference to WLAN systems in the 2.4GHz spectrum originating f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global Path-Cache Technique for Fast Handoffs in WLANs

    Publication Year: 2007, Page(s):45 - 50
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    This paper proposes a technique called Global Path-Cache (GPC) that provides fast handoffs in WLANs. GPC maintains a history of mobile stations' mobility patterns in a network to assist in the prediction of the next point-of-attachment. GPC properly captures the dynamic behavior of the network and mobile stations, and provides accurate next AP predictions. Our simulation study shows that GPC virtu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.