default search action
IPCCC 2007: New Orleans, Louisiana, USA
- Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA. IEEE Computer Society 2007, ISBN 1-4244-1138-6
- Huiqing Wang, Kin Choong Yow:
A QoS Framework to Support Integrated Services in Multihop Wireless Networks with Infrastructure Support. 1-8 - Luis Veloso, Paulo Mendes, Edmundo Monteiro:
Mobility Support of Multi-User Services in Next Generation Wireless Systems. 9-18 - Guoning Hu, Deepak Venugopal:
A Malware Signature Extraction and Detection Method Applied to Mobile Networks. 19-26 - Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, Miguel A. Labrador:
An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications. 27-34 - Sean D. Boyden, Anirban Mahanti, Carey L. Williamson:
TCP Vegas Performance with Streaming Media. 35-44 - Jae Chung, Mark Claypool, Robert E. Kinicki:
Stochastic Fair Traffic Management for Efficient and Robust IP Networking. 45-54 - Lu Peng, Jih-Kwon Peir, Tribuvan K. Prakash, Yen-Kuang Chen, David M. Koppelman:
Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study. 55-64 - Gabriel Marin, John M. Mellor-Crummey:
Application Insight Through Performance Modeling. 65-74 - Joel C. Wu, Bo Hong, Scott A. Brandt:
Ensuring Performance in Activity-Based File Relocation. 75-84 - My T. Thai, Yingshu Li, Feng Wang:
O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks. 85-92 - Haiming Yang, Biplab Sikdar:
Optimal Cluster Head Selection in the LEACH Architecture. 93-100 - Yanzhong Bi, Jianwei Niu, Limin Sun, Wei Huangfu, Yi Sun:
Moving Schemes for Mobile Sinks in Wireless Sensor Networks. 101-108 - Lei Shi, Gao Xia, Bin Liu:
Performance Guarantees for Flow-Mapping Parallel Packet Switch. 109-116 - Xiaolin Chang, Jogesh K. Muppala, Wei Kong, Pengcheng Zou, Xiangkai Li, Zhongyuan Zheng:
A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks. 117-124 - Miguel Jimeno, Kenneth J. Christensen, Allen Roginsky:
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. 125-133 - Behnoosh Hariri, Mohammad Reza Pakravan:
Analysis of Queuing Delay in RPR Networks. 134-141 - Tong Yi, Guoli Ding, Bogdan Oporowski:
A Low Bound for Broadcast in Optical Networks of Bounded Treewidth Using Fewest Converters. 142-149 - Tomoya Takenaka, Hiroshi Mineno, Yuichi Tokunaga, Naoto Miyauchi, Tadanori Mizuno:
Performance Evaluation of Optimized Link State Routing-based Localization. 150-159 - Vinh Pham, Erlend Larsen, Knut Øvsthus, Paal E. Engelstad, Øivind Kure:
Rerouting Time and Queueing in Proactive Ad Hoc Networks. 160-169 - Jun Peng, Liang Cheng:
Priority-Ensured Medium Access in Ad Hoc Networks. 170-177 - Toby Xu, Ymg Cai:
Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation. 178-185 - Zesheng Chen, Chao Chen, Chuanyi Ji:
Understanding Localized-Scanning Worms. 186-193 - Brian J. Thorp, Scott F. Midkiff:
An Application Layer Extension for Multipoint Communication for the Session Initiation Protocol. 194-201 - Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan:
Scalable and Decentralized Content-Aware Dispatching in Web Clusters. 202-209 - Xiao Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam:
Scheduling of Periodic Packets in Energy-Aware Wireless Networks. 210-217 - Haitang Wang, Dharma P. Agrawal, Qing-An Zeng:
Adaptive Transmission Scheme in IEEE 802.16 WMAN with Error Prone Channel. 218-225 - Aleksander Bai, Tor Skeie, Paal E. Engelstad:
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions. 226-235 - Timothy Bisson, Scott A. Brandt, Darrell D. E. Long:
A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem Support. 236-245 - Jehan-François Pâris, Thomas J. E. Schwarz, Darrell D. E. Long:
Self-Adaptive Two-Dimensional RAID Arrays. 246-253 - Cormac J. Doherty, Neil J. Hurley:
Hierarchical Policy-Based Replication. 254-263 - Chinh T. Vu, Raheem A. Beyah, Yingshu Li:
Composite Event Detection in Wireless Sensor Networks. 264-271 - Donggang Liu, Qi Dong:
Detecting Misused Keys in Wireless Sensor Networks. 272-280 - Kemal Akkaya, Mohamed F. Younis:
C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor Networks. 281-288 - Nils Aschenbruck, Peter Martini, Michael Gerharz:
How to Assign Traffic Sources to Nodes in Disaster Area Scenarios. 289-296 - Noun Choi, S. Venkatesan:
On Frugality of Control Packets in Multi-Hop Wireless Networks. 297-305 - Lijuan Cao, Teresa A. Dahlberg, Yu Wang:
Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols. 306-313 - Frank T. Johnsen, Trude Hafsøe, Carsten Griwodz, Pål Halvorsen:
Workload Characterization for News-on-Demand Streaming Services. 314-323 - Raju Rangaswami, Seyed Masoud Sadjadi, Nagarajan Prabakar, Yi Deng:
Automatic Generation of User-Centric Multimedia Communication Services. 324-331 - Chen-guang Xu, Yinlong Xu, Cheng Zhan, Ruizhe Wu, Qingshan Wang:
On Network Coding Based Multirate Video Streaming in Directed Networks. 332-339 - Purvi Shah, Jehan-François Pâris:
Peer-to-Peer Multimedia Streaming Using BitTorrent. 340-347 - Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen:
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. 348-355 - Jie Hu, Raymond Klefstad:
Scheduling Divisible Loads on Bus Networks with Arbitrary Processor Release Time and Start-Up Costs: XRMI. 356-364 - Soontae Kim:
Reducing ALU and Register File Energy by Dynamic Zero Detection. 365-371 - Santosh Talli, Ram Srinivasan, Jeanine E. Cook:
Compiler-Directed Functional Unit Shutdown for Microarchitecture Power Optimization. 372-379 - Chad M. Lawler, Michael A. Harper, Mitchell A. Thornton:
Components and Analysis of Disaster Tolerant Computing. 380-386 - Liang Chen, Jason Crampton:
Applications of the Oriented Permission Role-Based Access Control Model. 387-394 - Pallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal:
A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. 395-401 - Dragos Trinca, Sanguthevar Rajasekaran:
Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data. 402-409 - Mathias Kohler, Christian Liesegang, Andreas Schaad:
Classification Model for Access Control Constraints. 410-417 - Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. 418-425 - Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis:
Threat Analysis of the Session Initiation Protocol Regarding Spam. 426-433 - Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Diversified Process Replicæ for Defeating Memory Error Exploits. 434-441 - Yi Qian, Kejie Lu, David Tipper:
Towards Survivable and Secure Wireless Sensor Networks. 442-448 - Elisa Bertino, Ashish Kamra, James P. Early:
Profiling Database Application to Detect SQL Injection Attacks. 449-458 - Hui Ling, Taieb Znati:
GKM: A Group Dynamics Aware Key Management Scheme for Multicast Communications in Ad-hoc Sensor Networks. 459-466 - Kai Ouyang, James B. D. Joshi:
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. 467-474 - Yuriy Bulygin:
Epidemics of Mobile Worms. 475-478 - Raman Sharykin, Phillip A. Porras:
Applying Formal Evaluation to Worm Defense Design. 479-486 - Randal Acton, Nathan Friess, John Aycock:
Inverse Geolocation: Worms with a Sense of Direction. 487-493 - Jintao Xiong:
PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks. 494-501 - Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
SpyCon: Emulating User Activities to Detect Evasive Spyware. 502-509 - Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada:
d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. 510-517 - Pierre-Marc Bureau, José M. Fernandez:
Optimising Networks Against Malware. 518-527 - Fernando C. Colón Osorio:
Using Byzantine Agreement in the Design Of IPS Systems. 528-537 - Xuejun Cai, Ling Chen, Rute C. Sofia, Yanqi Wu:
Dynamic and User-Centric Network Selection in Heterogeneous Networks. 538-544 - Asma A. Elmangosh, Majdi A. Ashibani, Fathi B. Shatwan:
The Interworking between EDCA 802.11e and DiffServ. 545-550 - Vineet Chaudhary, Rajeev Tripathi, N. K. Shukla, Nidal Nasser:
A New Channel Allocation Scheme for Real-Time Traffic in Wireless Cellular Networks. 551-555 - Marco Roccetti, Mario Gerla, Claudio E. Palazzi, Stefano Ferretti, Giovanni Pau:
First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle. 556-561 - Tetsuya Kawai, Naoki Wakamiya, Masayuki Murata:
ACM: A Transmission Mechanism for Urgent Sensor Information. 562-569 - F. Richard Yu, Helen Tang, Victor C. M. Leung:
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures. 570-575 - Syed Rashid Ali Rizvi, Stephan Olariu, Mona E. Rizvi, Michele C. Weigle:
A Traffic Chaos Reduction Approach for Emergency Scenarios. 576-578 - Raheleh B. Dilmaghani, Ramesh R. Rao:
A Reliable Wireless Mesh Infrastructure Deployment at Crisis Site. 579-581 - Christian B. Almazan, Moustafa Youssef, Ashok K. Agrawala:
Rover: An Integration and Fusion Platform to Enhance Situational Awareness. 582-587 - Leszek Lilien, Ajay Gupta, Zijiang Yang:
Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework. 588-593 - Michele C. Weigle, Stephan Olariu:
Intelligent Highway Infrastructure for Planned Evacuations. 594-599 - Mourad Elhadef, Azzedine Boukerche:
A Gossip-Style Crash Faults Detection Protocol for Wireless Ad-Hoc and Mesh Networks. 600-605 - Henning Schulzrinne, Hannes Tschofenig, Andrew Newton, Ted Hardie:
LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points. 606-611 - Jiazhen Zhou, Cory C. Beard:
Adaptive Probabilistic Scheduling for a Cellular Emergency Network. 612-618 - Marcin Brzozowski, Reinhardt Karnapke, Jörg Nolte:
IMPACT - A Family of Cross-Layer Transmission Protocols for Wireless Sensor Networks. 619-625 - Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam, Andrew Newton:
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture. 626-631
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.