The Community for Technology Leaders
2012 20th IEEE International Conference on Network Protocols (ICNP) (2004)
Berlin, Germany
Oct. 5, 2004 to Oct. 8, 2004
ISSN: 1092-1648
ISBN: 0-7695-2161-4
TABLE OF CONTENTS

Reviewers (PDF)

pp. xi
Session I: Routing I

The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks (Abstract)

Ariel Orda , Technion - Israel Institute of Technology
Ron Banner , Technion - Israel Institute of Technology
pp. 2-11

On Self Adaptive Routing in Dynamic Environments - An Evaluation and Design Using a Simple, Probabilistic Scheme (Abstract)

Yang Richard Yang , Microsoft Research, Redmond, WA
Lili Qiu , Yale University, New Haven, CT
Haiyong Xie , AT&T Labs - Research, Florham Park, NJ
Yin Zhang , Yale University, New Haven, CT
pp. 12-23

Off-Piste QoS-aware Routing Protocol (Abstract)

Danny Dolev , The Hebrew University of Jerusalem, Israel
Yigal Eliaspur , The Hebrew University of Jerusalem, Israel
Tal Anker , The Hebrew University of Jerusalem, Israel
pp. 24-35

Trail Blazer: A Routing Algorithm Inspired by Ants (Abstract)

Eran Gabber , Google, Inc., New York, NY
Mark A. Smith , Lucent Technologies - Bell Laboratories, Murray Hill, NJ
pp. 36-47
Session II: Protocols

On the Robustness of Soft State Protocols (Abstract)

Vishal Misra , Columbia University, New York, NY
John C. S. Lui , The Chinese University of Hong Kong
Dan Rubenstein , Columbia University, New York, NY
pp. 50-60

Implementation and Evaluation of the Implementation and Evaluation of the (Abstract)

Sebastian Willert , University of G?ttingen, Germany
Dieter Hogrefe , University of G?ttingen, Germany
Xiaoming Fu , University of G?ttingen, Germany
pp. 61-71

A Typed Model for Encoding-Based Protocol Interoperability (Abstract)

Azer Bestavros , Boston University Department of Computer Science
Adam D. Bradley , Boston University Department of Computer Science
Assaf J. Kfoury , Boston University Department of Computer Science
pp. 72-83

Robustness of Class-Based Path-Vector Systems (Abstract)

Vijay Ramachandran , Yale University
Aaron D. Jaggard , Tulane University
pp. 84-93
Session III: Congestion Control

Congestion Control in Resilient Packet Rings (Abstract)

Aleksandra Smiljanic , AT&T Labs-Research, Florham Park, NJ
Dongmei Wang , AT&T Labs-Research, Florham Park, NJ
K. K. Ramakrishnan , AT&T Labs-Research, Florham Park, NJ
Charles Kalmanek , AT&T Labs-Research, Florham Park, NJ
Robert Doverspike , AT&T Labs-Research, Florham Park, NJ
pp. 108-117

Differential Congestion Notification: Taming the Elephants (Abstract)

Long Le , University of North Carolina at Chapel Hill
Jay Aikat , University of North Carolina at Chapel Hill
Kevin Jeffay , University of North Carolina at Chapel Hill
F. Donelson Smith , University of North Carolina at Chapel Hill
pp. 118-128

MPAT: Aggregate TCP Congestion Management as a Building Block for Internet QoS (Abstract)

Paul Francis , Cornell University
Manpreet Singh , Cornell University
Prashant Pradhan , IBM T.J. Watson Research Center
pp. 129-138
Session IV: Routing II

On-Demand Loop-Free Routing with Link Vectors (Abstract)

Soumya Roy , University of California, Santa Cruz
J. J. Garcia-Luna-Aceves , University of California, Santa Cruz
pp. 140-150

Minimum Energy Multicast Routing for Wireless Ad-hoc Networks with Adaptive Antennas (Abstract)

Oliver Yang , University of Ottawa, Canada
Song Guo , University of Ottawa, Canada
pp. 151-160

GPER: Geographic Power Efficient Routing in Sensor Networks (Abstract)

K. Sel?uk Candan , Arizona State University, Tempe
Shibo Wu , Arizona State University, Tempe
pp. 161-172
Session V: Security

Gigabit Rate Packet Pattern-Matching Using TCAM (Abstract)

Randy H. Katz , UC Berkeley
T. V. Lakshman , Bell Laboratories, Lucent Technologies
Fang Yu , UC Berkeley
pp. 174-183

Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources (Abstract)

Mina Guirguis , Boston University
Azer Bestavros , Boston University
Ibrahim Matta , Boston University
pp. 184-195

Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection (Abstract)

David K. Y. Yau , Purdue University
Haibin Sun , The Chinese University of Hong Kong
John C. S. Lui , The Chinese University of Hong Kong
pp. 196-205

Key Infection: Smart Trust for Smart Dust (Abstract)

Haowen Chan , Carnegie Mellon University
Ross Anderson , University of Cambridge
Adrian Perrig , Carnegie Mellon University
pp. 206-215
Session VI: P2P and Overlay Networks

Trading Resiliency for Security: Model and Algorithms (Abstract)

Samphel Norden , Bell Laboratories
Thomas Woo , Bell Laboratories
Tian Bu , Bell Laboratories
pp. 218-227

Semantic Small World: An Overlay Network for Peer-to-Peer Search (Abstract)

Mei Li , Pennsylvania State University, University Park, PA
Wang-Chien Lee , Pennsylvania State University, University Park, PA
Anand Sivasubramaniam , Pennsylvania State University, University Park, PA
pp. 228-238

An Adaptive Protocol for Efficient Support of Range Queries in DHT-Based Systems (Abstract)

Jun Gao , Carnegie Mellon University, Pittsburgh, PA
Peter Steenkiste , Carnegie Mellon University, Pittsburgh, PA
pp. 239-250
Session VIII: Wireless Networks

Sniffing Out the Correct Physical Layer Capture Model in 802.11b (Abstract)

Andrzej Kochut , University of Maryland, College Park
Ashok Agrawala , University of Maryland, College Park
A. Udaya Shankar , University of Maryland, College Park
Arunchandar Vasan , University of Maryland, College Park
pp. 252-261

SDJS: Efficient Statistics in Wireless Networks (Abstract)

Sabin Wendhack , Universit?t Karlsruhe
Albert Krohn , Universit?t Karlsruhe
Michael Beigl , Universit?t Karlsruhe
pp. 262-270

Optimizing the Placement of Internet TAPs in Wireless Neighborhood Networks (Abstract)

Kamal Jain , Microsoft Research
Lili Qiu , Microsoft Research
Mohammad Mahdian , Microsoft Research
Ranveer Chandra , Cornell University
pp. 271-282

Deafness: A MAC Problem in Ad Hoc Networks when using Directional Antennas (Abstract)

Romit Roy Choudhury , University of Illinois at Urbana-Champaign
Nitin H. Vaidya , University of Illinois at Urbana-Champaign
pp. 283-292
Session IX: Performance Evaluation

Comparing the Structure of Power-Law Graphs and the Internet AS Graph (Abstract)

Don Towsley , Univ. of Massachusetts, Amherst
Sharad Jaiswal , Univ. of Massachusetts, Amherst
Arnold L. Rosenberg , Univ. of Massachusetts, Amherst
pp. 294-303

Exploring the Performance Benefits of End-to-End Path Switching (Abstract)

Don Towsley , University of Massachusetts
Kuai Xu , University of Minnesota
Lixin Gao , University of Massachusetts
Shu Tao , University of Pennsylvania
Teng Fei , University of Massachusetts
Jim Kurose , University of Massachusetts
Ying Xu , University of Pennsylvania
Zhi-Li Zhang , University of Minnesota
Roch Gu?rin , University of Pennsylvania
pp. 304-315

Packet-Pair Bandwidth Estimation: Stochastic Analysis of a Single Congested Node (Abstract)

Xiliang Liu , City University of New York
Seong-ryong Kang , Texas A&M University, College Station
Min Dai , Texas A&M University, College Station
Dmitri Loguinov , Texas A&M University, College Station
pp. 316-325
Session X: Network Management

Ethernet Topology Discovery without Network Assistance (Abstract)

C?dric Fournet , Microsoft Research, UK
Richard Black , Microsoft Research, UK
Austin Donnelly , Microsoft Research, UK
pp. 328-339

Real-Time Detection of Hidden Traffic Patterns (Abstract)

Murali Kodialam , Bell Labs, Holmdel, NJ
T. V. Lakshman , Bell Labs, Holmdel, NJ
Fang Hao , Bell Labs, Holmdel, NJ
pp. 340-349

Design and Analysis of a Leader Election Algorithm for Mobile Ad Hoc Networks (Abstract)

Sudarshan Vasudevan , University of Massachusetts, Amherst
Jim Kurose , University of Massachusetts, Amherst
Don Towsley , University of Massachusetts, Amherst
pp. 350-360

A Feasibility Study for Power Management in LAN Switches (Abstract)

Suresh Singh , Portland State University
Satyajit Grover , Portland State University
Maruti Gupta , Portland State University
pp. 361-371

Authro Index (PDF)

pp. 373-374
122 ms
(Ver )