


default search action
IPCCC 2007: New Orleans, Louisiana, USA
- Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA. IEEE Computer Society 2007, ISBN 1-4244-1138-6

- Huiqing Wang, Kin Choong Yow:

A QoS Framework to Support Integrated Services in Multihop Wireless Networks with Infrastructure Support. 1-8 - Luis Veloso, Paulo Mendes

, Edmundo Monteiro
:
Mobility Support of Multi-User Services in Next Generation Wireless Systems. 9-18 - Guoning Hu, Deepak Venugopal:

A Malware Signature Extraction and Detection Method Applied to Mobile Networks. 19-26 - Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, Miguel A. Labrador:

An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications. 27-34 - Sean D. Boyden, Anirban Mahanti, Carey L. Williamson:

TCP Vegas Performance with Streaming Media. 35-44 - Jae Chung, Mark Claypool, Robert E. Kinicki:

Stochastic Fair Traffic Management for Efficient and Robust IP Networking. 45-54 - Lu Peng, Jih-Kwon Peir, Tribuvan K. Prakash, Yen-Kuang Chen

, David M. Koppelman:
Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study. 55-64 - Gabriel Marin, John M. Mellor-Crummey

:
Application Insight Through Performance Modeling. 65-74 - Joel C. Wu, Bo Hong, Scott A. Brandt:

Ensuring Performance in Activity-Based File Relocation. 75-84 - My T. Thai, Yingshu Li

, Feng Wang
:
O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks. 85-92 - Haiming Yang, Biplab Sikdar

:
Optimal Cluster Head Selection in the LEACH Architecture. 93-100 - Yanzhong Bi, Jianwei Niu

, Limin Sun, Wei Huangfu
, Yi Sun:
Moving Schemes for Mobile Sinks in Wireless Sensor Networks. 101-108 - Lei Shi, Gao Xia, Bin Liu:

Performance Guarantees for Flow-Mapping Parallel Packet Switch. 109-116 - Xiaolin Chang, Jogesh K. Muppala

, Wei Kong, Pengcheng Zou, Xiangkai Li, Zhongyuan Zheng:
A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks. 117-124 - Miguel Jimeno

, Kenneth J. Christensen, Allen Roginsky:
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. 125-133 - Behnoosh Hariri, Mohammad Reza Pakravan:

Analysis of Queuing Delay in RPR Networks. 134-141 - Tong Yi, Guoli Ding, Bogdan Oporowski:

A Low Bound for Broadcast in Optical Networks of Bounded Treewidth Using Fewest Converters. 142-149 - Tomoya Takenaka, Hiroshi Mineno

, Yuichi Tokunaga, Naoto Miyauchi, Tadanori Mizuno:
Performance Evaluation of Optimized Link State Routing-based Localization. 150-159 - Vinh Pham, Erlend Larsen, Knut Øvsthus, Paal E. Engelstad, Øivind Kure:

Rerouting Time and Queueing in Proactive Ad Hoc Networks. 160-169 - Jun Peng, Liang Cheng:

Priority-Ensured Medium Access in Ad Hoc Networks. 170-177 - Toby Xu, Ymg Cai:

Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation. 178-185 - Zesheng Chen, Chao Chen, Chuanyi Ji:

Understanding Localized-Scanning Worms. 186-193 - Brian J. Thorp, Scott F. Midkiff

:
An Application Layer Extension for Multipoint Communication for the Session Initiation Protocol. 194-201 - Zhiyong Xu, Jizhong Han

, Laxmi N. Bhuyan:
Scalable and Decentralized Content-Aware Dispatching in Web Clusters. 202-209 - Xiao Qin

, Mohammed I. Alghamdi
, Mais Nijim, Ziliang Zong, Kiranmai Bellam:
Scheduling of Periodic Packets in Energy-Aware Wireless Networks. 210-217 - Haitang Wang, Dharma P. Agrawal, Qing-An Zeng:

Adaptive Transmission Scheme in IEEE 802.16 WMAN with Error Prone Channel. 218-225 - Aleksander Bai, Tor Skeie, Paal E. Engelstad:

A Model-Based Admission Control for 802.11e EDCA using Delay Predictions. 226-235 - Timothy Bisson, Scott A. Brandt, Darrell D. E. Long:

A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem Support. 236-245 - Jehan-François Pâris

, Thomas J. E. Schwarz, Darrell D. E. Long:
Self-Adaptive Two-Dimensional RAID Arrays. 246-253 - Cormac J. Doherty, Neil J. Hurley

:
Hierarchical Policy-Based Replication. 254-263 - Chinh T. Vu, Raheem A. Beyah

, Yingshu Li
:
Composite Event Detection in Wireless Sensor Networks. 264-271 - Donggang Liu, Qi Dong:

Detecting Misused Keys in Wireless Sensor Networks. 272-280 - Kemal Akkaya, Mohamed F. Younis

:
C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor Networks. 281-288 - Nils Aschenbruck, Peter Martini, Michael Gerharz:

How to Assign Traffic Sources to Nodes in Disaster Area Scenarios. 289-296 - Noun Choi, S. Venkatesan:

On Frugality of Control Packets in Multi-Hop Wireless Networks. 297-305 - Lijuan Cao, Teresa A. Dahlberg, Yu Wang:

Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols. 306-313 - Frank T. Johnsen, Trude Hafsøe, Carsten Griwodz, Pål Halvorsen:

Workload Characterization for News-on-Demand Streaming Services. 314-323 - Raju Rangaswami

, Seyed Masoud Sadjadi, Nagarajan Prabakar
, Yi Deng:
Automatic Generation of User-Centric Multimedia Communication Services. 324-331 - Chen-guang Xu, Yinlong Xu, Cheng Zhan, Ruizhe Wu, Qingshan Wang:

On Network Coding Based Multirate Video Streaming in Directed Networks. 332-339 - Purvi Shah, Jehan-François Pâris

:
Peer-to-Peer Multimedia Streaming Using BitTorrent. 340-347 - Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen:

Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. 348-355 - Jie Hu, Raymond Klefstad:

Scheduling Divisible Loads on Bus Networks with Arbitrary Processor Release Time and Start-Up Costs: XRMI. 356-364 - Soontae Kim

:
Reducing ALU and Register File Energy by Dynamic Zero Detection. 365-371 - Santosh Talli, Ram Srinivasan, Jeanine E. Cook:

Compiler-Directed Functional Unit Shutdown for Microarchitecture Power Optimization. 372-379 - Chad M. Lawler, Michael A. Harper, Mitchell A. Thornton

:
Components and Analysis of Disaster Tolerant Computing. 380-386 - Liang Chen, Jason Crampton:

Applications of the Oriented Permission Role-Based Access Control Model. 387-394 - Pallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal:

A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. 395-401 - Dragos Trinca, Sanguthevar Rajasekaran:

Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data. 402-409 - Mathias Kohler, Christian Liesegang, Andreas Schaad:

Classification Model for Access Control Constraints. 410-417 - Danilo Bruschi, Lorenzo Cavallaro

, Andrea Lanzi:
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. 418-425 - Stelios Dritsas, John Mallios, Marianthi Theoharidou

, Giannis F. Marias, Dimitris Gritzalis:
Threat Analysis of the Session Initiation Protocol Regarding Spam. 426-433 - Danilo Bruschi, Lorenzo Cavallaro

, Andrea Lanzi:
Diversified Process Replicæ for Defeating Memory Error Exploits. 434-441 - Yi Qian, Kejie Lu, David Tipper

:
Towards Survivable and Secure Wireless Sensor Networks. 442-448 - Elisa Bertino, Ashish Kamra, James P. Early:

Profiling Database Application to Detect SQL Injection Attacks. 449-458 - Hui Ling, Taieb Znati:

GKM: A Group Dynamics Aware Key Management Scheme for Multicast Communications in Ad-hoc Sensor Networks. 459-466 - Kai Ouyang, James B. D. Joshi:

CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. 467-474 - Yuriy Bulygin

:
Epidemics of Mobile Worms. 475-478 - Raman Sharykin, Phillip A. Porras:

Applying Formal Evaluation to Worm Defense Design. 479-486 - Randal Acton, Nathan Friess, John Aycock:

Inverse Geolocation: Worms with a Sense of Direction. 487-493 - Jintao Xiong:

PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks. 494-501 - Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:

SpyCon: Emulating User Activities to Detect Evasive Spyware. 502-509 - Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada:

d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. 510-517 - Pierre-Marc Bureau, José M. Fernandez

:
Optimising Networks Against Malware. 518-527 - Fernando C. Colón Osorio:

Using Byzantine Agreement in the Design Of IPS Systems. 528-537 - Xuejun Cai, Ling Chen, Rute C. Sofia

, Yanqi Wu:
Dynamic and User-Centric Network Selection in Heterogeneous Networks. 538-544 - Asma A. Elmangosh

, Majdi A. Ashibani, Fathi B. Shatwan:
The Interworking between EDCA 802.11e and DiffServ. 545-550 - Vineet Chaudhary, Rajeev Tripathi

, N. K. Shukla, Nidal Nasser
:
A New Channel Allocation Scheme for Real-Time Traffic in Wireless Cellular Networks. 551-555 - Marco Roccetti

, Mario Gerla, Claudio E. Palazzi
, Stefano Ferretti
, Giovanni Pau
:
First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle. 556-561 - Tetsuya Kawai, Naoki Wakamiya, Masayuki Murata

:
ACM: A Transmission Mechanism for Urgent Sensor Information. 562-569 - F. Richard Yu

, Helen Tang, Victor C. M. Leung
:
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures. 570-575 - Syed Rashid Ali Rizvi, Stephan Olariu, Mona E. Rizvi, Michele C. Weigle

:
A Traffic Chaos Reduction Approach for Emergency Scenarios. 576-578 - Raheleh B. Dilmaghani, Ramesh R. Rao:

A Reliable Wireless Mesh Infrastructure Deployment at Crisis Site. 579-581 - Christian B. Almazan, Moustafa Youssef

, Ashok K. Agrawala:
Rover: An Integration and Fusion Platform to Enhance Situational Awareness. 582-587 - Leszek Lilien

, Ajay Gupta
, Zijiang Yang:
Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework. 588-593 - Michele C. Weigle

, Stephan Olariu:
Intelligent Highway Infrastructure for Planned Evacuations. 594-599 - Mourad Elhadef

, Azzedine Boukerche:
A Gossip-Style Crash Faults Detection Protocol for Wireless Ad-Hoc and Mesh Networks. 600-605 - Henning Schulzrinne, Hannes Tschofenig, Andrew Newton, Ted Hardie:

LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points. 606-611 - Jiazhen Zhou, Cory C. Beard:

Adaptive Probabilistic Scheduling for a Cellular Emergency Network. 612-618 - Marcin Brzozowski, Reinhardt Karnapke, Jörg Nolte:

IMPACT - A Family of Cross-Layer Transmission Protocols for Wireless Sensor Networks. 619-625 - Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam, Andrew Newton:

Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture. 626-631

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














