The Community for Technology Leaders
2012 20th IEEE International Conference on Network Protocols (ICNP) (2005)
Boston, Massachusetts
Nov. 6, 2005 to Nov. 9, 2005
ISBN: 0-7695-2437-0
TABLE OF CONTENTS
Introduction
Cover
Introduction

Committees (PDF)

pp. xiii-xiv
Interdomain Routing

Expected Convergence Properties of BGP (Abstract)

Krishan K. Sabnani , Bell Laboratories Lucent Technologies
Ramesh Viswanathan , Bell Laboratories Lucent Technologies
Robert J. Holt , City University of New York
pp. 3-15

Stable Egress Route Selection for Interdomain Traffic Engineering: Model and Analysis (Abstract)

Yang Richard Yang , Yale University, New Haven, CT
Hao Wang , Yale University, New Haven, CT
Yanbin Liu , University of Texas at Austin
Avi Silberschatz Silberschatz , Yale University, New Haven, CT
Haiyong Xie , Yale University, New Haven, CT
Li Erran Li , Bell-labs, Murray Hill, NJ
pp. 16-29

On Understanding of Transient Interdomain Routing Failures (Abstract)

Jian Qiu , University of Massachusetts, Amherst
Lixin Gao , University of Massachusetts, Amherst
Jia Wang , AT&T Labs-Research, Florham Park
Feng Wang , University of Massachusetts, Amherst
pp. 30-39

On the Stability of Rational, Heterogeneous Interdomain Route Selection (Abstract)

Avi Silberschatz , Yale University, New Haven, CT
Yang Richard Yang , Yale University, New Haven, CT
Li Erran Li , Networking Research Lab, Bell-labs, Murray
Haiyong Xie , Yale University, New Haven, CT
Yanbin Liu , University of Texas, Austin
Hao Wang , Yale University, New Haven, CT
pp. 40-52
Sensor and Ad-Hoc Protocols

Analyzing the Yield of ExScal, a Large-Scale Wireless Sensor Network Experiment (Abstract)

Sandip Bapat , Ohio State University
Anish Arora , Ohio State University
Vinodkrishnan Kulathumani , Ohio State University
pp. 53-62

Tracking Targets with Quality inWireless Sensor Networks (Abstract)

Jennifer C. Hou , Univ. of Illinois at Urbana Champaign
Guanghui He , Univ. of Illinois at Urbana Champaign
pp. 63-74

The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks (Abstract)

Yan Gao , Chinese University of Hong Kong
John C.S. Lui , Chinese University of Hong Kong
Dah-Ming Chiu , Chinese University of Hong Kong
pp. 75-84

Routing in Ad-hoc Networks with MIMO Links (Abstract)

Raghupathy Sivakumar , Georgia Institute of Technology
Karthikeyan Sundaresan , Georgia Institute of Technology
pp. 85-98
Peer-to-Peer Protocols

MuON: Epidemic Based Mutual Anonymity (Abstract)

Neelesh Bansod , Michigan Technological University
Byung Kyu Choi , Michigan Technological University
Jean Mayo , Michigan Technological University
Ashish Malgi , Michigan Technological University
pp. 99-109

Incentives to Promote Availability in Peer-to-Peer Anonymity Systems (Abstract)

Don Towsley , University of Massachusetts
Daniel Figueiredo , University of Massachusetts
Jonathan Shapiro , Michigan State University
pp. 110-121

Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks (Abstract)

Shudong Jin , Case Western Reserve University, Cleveland
Hongbo Jiang , Case Western Reserve University, Cleveland
pp. 122-131

Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol (Abstract)

Zheng Zhang , Microsoft Research Asia, Beijing, China
Qiao Lian , Microsoft Research Asia, Beijing, China
Ben Y. Zhao , U. C. Santa Barbara
Shaomei Wu , U. C. Santa Barbara
pp. 132-146
Geographic Routing in Ad-Hoc Networks

Path Vector Face Routing: Geographic Routing with Local Face Information (Abstract)

Ben Leong , MIT Computer Science and Artificial Intelligence lab
Sayan Mitra , MIT Computer Science and Artificial Intelligence lab
Barbara Liskov , MIT Computer Science and Artificial Intelligence lab
pp. 147-158

Simple Robotic Routing in Ad Hoc Networks (Abstract)

Nick Maxemchuk , Columbia University
Daejoong Kim , Columbia University
pp. 159-168

Landmark Guided Forwarding (Abstract)

Jon Crowcroft , University of Cambridge, UK
Julian Chesterfield , University of Cambridge, UK
Menghow Lim , University of Cambridge, UK
Julian Chesterfield , University of Cambridge, UK
pp. 169-178

Efficient Hop ID based Routing for Sparse Ad Hoc Networks (Abstract)

Yao Zhao , Yao Zhao
Yan Chen , Yan Chen
Bo Li , Bo Li
Qian Zhang , Qian Zhang
Wenwu Zhu , Wenwu Zhu
pp. 179-190
Overlay Protocols

Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events (Abstract)

Zihui Ge , AT&T Labs-Research
Don Towsley , University of Massachusetts Amherst
Weifeng Chen , University of Massachusetts Amherst
Jim Kurose , University of Massachusetts Amherst
pp. 191-200

Can coexisting overlays inadvertently step on each other? (Abstract)

Ram Keralapura , University of California, Davis
Gianluca QIannacco , Intel Research Labs
Nina Taft Taft , Intel Research Labs
Chen-Nee Chuah , University of California, Davis
pp. 201-214
Dimensioning and Traffic Engineering

Optimal Routing with Multiple Traffic Matrices Tradeoff between Average andWorst Case Performance (Abstract)

Chun Zhanga , University of Massachusetts
Zihui Ge , AT&T Research,
Don Towsley , University of Massachusetts
Yong Liu , Polytechnic University, Brooklyn, NY
Jim Kurosea , University of Massachusetts
pp. 215-224

Does Over-Provisioning Become More or Less Efficient as Networks Grow Larger? (Abstract)

Roch Guerin , University of Pennsylvania
Yaqing Huang , University of Pennsylvania
pp. 225-235

Robust Multiclass Signaling Overload Control (Abstract)

Adiseshu Har , Adiseshu Har
Tom LaPorta , Pennsylvania State University
Mehmet Karaul , Self-Employed
Jose Pinheiro , Novartis Pharmaceuticals
Catherine Loader , Case Western Reserve University
Sneha Kasera , University of Utah
pp. 246-258
Security and Safety

Modeling and Verification of IPSec and VPN Security Policies (Abstract)

Will Marrero , DePaul University, Chicago
Hazem Hamed , DePaul University, Chicago
Ehab Al-Shaer , DePaul University, Chicago
pp. 259-278

Efficient Node Admission for Short-lived Mobile Ad Hoc Networks (Abstract)

Nitesh Saxena , University of California, Irvine
Gene Tsudik , University of California, Irvine
Jeong Hyun Yi , Samsung Advanced Institute of Technology
pp. 269-278

A Family of Collusion Resistant Protocols for Instantiating Security (Abstract)

Bruhadeshwar Bezawada , Michigan State University
Sandeep S. Kulkarni , Michigan State University
pp. 279-288

Typed Abstraction of Complex Network Compositions (Abstract)

Ibrahim Matta , Boston University
Adam D. Bradley , Boston University
Azer Bestavros , Boston University
Assaf J. Kfoury , Boston University
pp. 289-300
Congestion Control

TCP Connection Game: A Study on the Selfish Behavior of TCP Users (Abstract)

Honggang Zhang , Comp. Science, University of Massachusetts, Amherst
Weibo Gong , Computer Engineering, University of Massachusetts
Don Towsley , Comp. Science, University of Massachusetts, Amherst
pp. 301-310

Priority Pricing in Utility Fair Networks (Abstract)

Tobias Harks , Zuse-Institute-Berlin
Tobias Poschwatta , Technische Universitat Berlin
pp. 311-320

Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking (Abstract)

Don Towsley , University of Massachusetts
C. V. Hollot , University of Massachusetts
Jonathan Shapiro , Michigan State University
pp. 321-331

CONNET: Self-Controlled Access Links for Delay and Jitter Requirements (Abstract)

Mohamed El Gendy , University of Michigan, Ann Arbor
Kang G. Shin , University of Michigan, Ann Arbor
Hosam Fathy , University of Michigan, Ann Arbor
pp. 332-344
Protocol Implementation

On Static and Dynamic Partitioning Behavior of Large-Scale Networks (Abstract)

Zhongmei Yao , Texas A&M University, College Station
Derek Leonard , Texas A&M University, College Station
Xiaoming Wang , Texas A&M University, College Station
Dmitri Loguinov , Texas A&M University, College Station
pp. 345-357

Shape Shifting Tries for Faster IP Route Lookup (Abstract)

Haoyu Song , Washington University in St. Louis
Jonathan Turner , Washington University in St. Louis
John Lockwood , Washington University in St. Louis
pp. 358-367

Efficient Probabilistic Packet Marking (Abstract)

Suman Banerjee , University of Wisconsin-Madison
Qunfeng Dong , University of Wisconsin-Madison
Micah Adler , University of Massachusetts-Amherst
Kazu Hirata , University of Massachusetts-Amherst
pp. 368-377

Intersection Characteristics of End-to-End Internet Paths and Trees (Abstract)

Sevcan Bilir , University of Texas at Dallas
Turgay Korkmaz , University of Texas at San Antonio
Kamil Sarac , University of Texas at Dallas
Kamil Sarac , University of Texas at Dallas
pp. 378-390
Wireless Transport

Stability and Sensitivity for Congestion Control in Wireless Networks with Time Varying Link Capacities (Abstract)

Yonghe Liu , University of Texas at Arlingto
Yiyu Wu , University of Texas at Arlingto
Guohua Zhang , University of Texas at Arlingto
pp. 401-412
Author Index

Author Index (PDF)

pp. 413
104 ms
(Ver 3.1 (10032016))