The Community for Technology Leaders
Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004. (2004)
Berlin, Germany
Oct. 5, 2004 to Oct. 8, 2004
ISSN: 1092-1648
ISBN: 0-7695-2161-4
TABLE OF CONTENTS

Reviewers (PDF)

pp. xi
Session I: Routing I

The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks (Abstract)

Ron Banner , Technion - Israel Institute of Technology
Ariel Orda , Technion - Israel Institute of Technology
pp. 2-11

On Self Adaptive Routing in Dynamic Environments - An Evaluation and Design Using a Simple, Probabilistic Scheme (Abstract)

Lili Qiu , Yale University, New Haven, CT
Yang Richard Yang , Microsoft Research, Redmond, WA
Yin Zhang , Yale University, New Haven, CT
Haiyong Xie , AT&T Labs - Research, Florham Park, NJ
pp. 12-23

Off-Piste QoS-aware Routing Protocol (Abstract)

Tal Anker , The Hebrew University of Jerusalem, Israel
Danny Dolev , The Hebrew University of Jerusalem, Israel
Yigal Eliaspur , The Hebrew University of Jerusalem, Israel
pp. 24-35

Trail Blazer: A Routing Algorithm Inspired by Ants (Abstract)

Eran Gabber , Google, Inc., New York, NY
Mark A. Smith , Lucent Technologies - Bell Laboratories, Murray Hill, NJ
pp. 36-47
Session II: Protocols

On the Robustness of Soft State Protocols (Abstract)

John C. S. Lui , The Chinese University of Hong Kong
Vishal Misra , Columbia University, New York, NY
Dan Rubenstein , Columbia University, New York, NY
pp. 50-60

Implementation and Evaluation of the Implementation and Evaluation of the (Abstract)

Xiaoming Fu , University of G?ttingen, Germany
Dieter Hogrefe , University of G?ttingen, Germany
Sebastian Willert , University of G?ttingen, Germany
pp. 61-71

A Typed Model for Encoding-Based Protocol Interoperability (Abstract)

Adam D. Bradley , Boston University Department of Computer Science
Azer Bestavros , Boston University Department of Computer Science
Assaf J. Kfoury , Boston University Department of Computer Science
pp. 72-83

Robustness of Class-Based Path-Vector Systems (Abstract)

Aaron D. Jaggard , Tulane University
Vijay Ramachandran , Yale University
pp. 84-93
Session III: Congestion Control

Congestion Control in Resilient Packet Rings (Abstract)

Dongmei Wang , AT&T Labs-Research, Florham Park, NJ
K. K. Ramakrishnan , AT&T Labs-Research, Florham Park, NJ
Charles Kalmanek , AT&T Labs-Research, Florham Park, NJ
Robert Doverspike , AT&T Labs-Research, Florham Park, NJ
Aleksandra Smiljanic , AT&T Labs-Research, Florham Park, NJ
pp. 108-117

Differential Congestion Notification: Taming the Elephants (Abstract)

Long Le , University of North Carolina at Chapel Hill
Jay Aikat , University of North Carolina at Chapel Hill
Kevin Jeffay , University of North Carolina at Chapel Hill
F. Donelson Smith , University of North Carolina at Chapel Hill
pp. 118-128

MPAT: Aggregate TCP Congestion Management as a Building Block for Internet QoS (Abstract)

Manpreet Singh , Cornell University
Prashant Pradhan , IBM T.J. Watson Research Center
Paul Francis , Cornell University
pp. 129-138
Session IV: Routing II

On-Demand Loop-Free Routing with Link Vectors (Abstract)

J. J. Garcia-Luna-Aceves , University of California, Santa Cruz
Soumya Roy , University of California, Santa Cruz
pp. 140-150

Minimum Energy Multicast Routing for Wireless Ad-hoc Networks with Adaptive Antennas (Abstract)

Song Guo , University of Ottawa, Canada
Oliver Yang , University of Ottawa, Canada
pp. 151-160

GPER: Geographic Power Efficient Routing in Sensor Networks (Abstract)

Shibo Wu , Arizona State University, Tempe
K. Sel?uk Candan , Arizona State University, Tempe
pp. 161-172
Session V: Security

Gigabit Rate Packet Pattern-Matching Using TCAM (Abstract)

Fang Yu , UC Berkeley
Randy H. Katz , UC Berkeley
T. V. Lakshman , Bell Laboratories, Lucent Technologies
pp. 174-183

Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources (Abstract)

Mina Guirguis , Boston University
Azer Bestavros , Boston University
Ibrahim Matta , Boston University
pp. 184-195

Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection (Abstract)

Haibin Sun , The Chinese University of Hong Kong
John C. S. Lui , The Chinese University of Hong Kong
David K. Y. Yau , Purdue University
pp. 196-205

Key Infection: Smart Trust for Smart Dust (Abstract)

Ross Anderson , University of Cambridge
Haowen Chan , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
pp. 206-215
Session VI: P2P and Overlay Networks

Trading Resiliency for Security: Model and Algorithms (Abstract)

Tian Bu , Bell Laboratories
Samphel Norden , Bell Laboratories
Thomas Woo , Bell Laboratories
pp. 218-227

Semantic Small World: An Overlay Network for Peer-to-Peer Search (Abstract)

Mei Li , Pennsylvania State University, University Park, PA
Wang-Chien Lee , Pennsylvania State University, University Park, PA
Anand Sivasubramaniam , Pennsylvania State University, University Park, PA
pp. 228-238

An Adaptive Protocol for Efficient Support of Range Queries in DHT-Based Systems (Abstract)

Jun Gao , Carnegie Mellon University, Pittsburgh, PA
Peter Steenkiste , Carnegie Mellon University, Pittsburgh, PA
pp. 239-250
Session VIII: Wireless Networks

Sniffing Out the Correct Physical Layer Capture Model in 802.11b (Abstract)

Andrzej Kochut , University of Maryland, College Park
Arunchandar Vasan , University of Maryland, College Park
A. Udaya Shankar , University of Maryland, College Park
Ashok Agrawala , University of Maryland, College Park
pp. 252-261

SDJS: Efficient Statistics in Wireless Networks (Abstract)

Albert Krohn , Universit?t Karlsruhe
Michael Beigl , Universit?t Karlsruhe
Sabin Wendhack , Universit?t Karlsruhe
pp. 262-270

Optimizing the Placement of Internet TAPs in Wireless Neighborhood Networks (Abstract)

Ranveer Chandra , Cornell University
Lili Qiu , Microsoft Research
Kamal Jain , Microsoft Research
Mohammad Mahdian , Microsoft Research
pp. 271-282

Deafness: A MAC Problem in Ad Hoc Networks when using Directional Antennas (Abstract)

Romit Roy Choudhury , University of Illinois at Urbana-Champaign
Nitin H. Vaidya , University of Illinois at Urbana-Champaign
pp. 283-292
Session IX: Performance Evaluation

Comparing the Structure of Power-Law Graphs and the Internet AS Graph (Abstract)

Sharad Jaiswal , Univ. of Massachusetts, Amherst
Arnold L. Rosenberg , Univ. of Massachusetts, Amherst
Don Towsley , Univ. of Massachusetts, Amherst
pp. 294-303

Exploring the Performance Benefits of End-to-End Path Switching (Abstract)

Shu Tao , University of Pennsylvania
Kuai Xu , University of Minnesota
Ying Xu , University of Pennsylvania
Teng Fei , University of Massachusetts
Lixin Gao , University of Massachusetts
Roch Gu?rin , University of Pennsylvania
Jim Kurose , University of Massachusetts
Don Towsley , University of Massachusetts
Zhi-Li Zhang , University of Minnesota
pp. 304-315

Packet-Pair Bandwidth Estimation: Stochastic Analysis of a Single Congested Node (Abstract)

Seong-ryong Kang , Texas A&M University, College Station
Xiliang Liu , City University of New York
Min Dai , Texas A&M University, College Station
Dmitri Loguinov , Texas A&M University, College Station
pp. 316-325
Session X: Network Management

Ethernet Topology Discovery without Network Assistance (Abstract)

Richard Black , Microsoft Research, UK
Austin Donnelly , Microsoft Research, UK
C?dric Fournet , Microsoft Research, UK
pp. 328-339

Real-Time Detection of Hidden Traffic Patterns (Abstract)

Fang Hao , Bell Labs, Holmdel, NJ
Murali Kodialam , Bell Labs, Holmdel, NJ
T. V. Lakshman , Bell Labs, Holmdel, NJ
pp. 340-349

Design and Analysis of a Leader Election Algorithm for Mobile Ad Hoc Networks (Abstract)

Sudarshan Vasudevan , University of Massachusetts, Amherst
Jim Kurose , University of Massachusetts, Amherst
Don Towsley , University of Massachusetts, Amherst
pp. 350-360

A Feasibility Study for Power Management in LAN Switches (Abstract)

Maruti Gupta , Portland State University
Satyajit Grover , Portland State University
Suresh Singh , Portland State University
pp. 361-371

Authro Index (PDF)

pp. 373-374
79 ms
(Ver 3.3 (11022016))