ISBN-13: 9783540253389 / Angielski / Miękka / 2005 / 1153 str.
ISBN-13: 9783540253389 / Angielski / Miękka / 2005 / 1153 str.
The two-volume set LNCS 3420/3421 constitutes the refereed proceedings of the 4th International Conference on Networking, ICN 2005, held in Reunion Island, France in April 2005.The 238 revised full papers presented were carefully reviewed and selected from 651 submissions. The papers are organized in topical sections on grid computing, optical networks, wireless networks, QoS, WPAN, sensor networks, traffic control, communication architectures, audio and video communications, differentiated services, switching, streaming, MIMO, MPLS, ad-hoc networks, TCP, routing, signal processing, mobility, performance, peer-to-peer networks, network security, CDMA, network anomaly detection, multicast, 802.11 networks, and emergency, disaster, and resilency.
MIMO.- Decoding Consideration for Space Time Coded MIMO Channel with Constant Amplitude Multi-code System.- MIMO Frequency Hopping OFDM-CDMA: A Novel Uplink System for B3G Cellular Networks.- Transient Capacity Evaluation of UWB Ad Hoc Network with MIMO.- Chip-by-Chip Iterative Multiuser Detection for VBLAST Coded Multiple-Input Multiple-Output Systems.- MPLS.- The Performance Analysis of Two-Class Priority Queueing in MPLS-Enabled IP Network.- Constraint Based LSP Handover (CBLH) in MPLS Networks.- Optimizing Inter-domain Multicast Through DINloop with GMPLS.- A Fast Path Recovery Mechanism for MPLS Networks.- A Study of Billing Schemes in an Experimental Next Generation Network.- Overlay Logging: An IP Traceback Scheme in MPLS Network.- Ad Hoc Networks (I).- Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks.- Multi-path Routing Using Local Virtual Infrastructure for Large-Scale Mobile Ad-Hoc Networks: Stochastic Optimization Approach.- Candidate Discovery for Connected Mobile Ad Hoc Networks.- A Fault-Tolerant Permutation Routing Algorithm in Mobile Ad-Hoc Networks.- Policy-Based Dynamic Reconfiguration of Mobile Ad Hoc Networks.- TCP (I).- V-TCP: A Novel TCP Enhancement Technique.- Optimizing TCP Retransmission Timeout.- Stable Accurate Rapid Bandwidth Estimate for Improving TCP over Wireless Networks.- Performance Analysis of TCP Variants over Time-Space-Labeled Optical Burst Switched Networks.- Routing (I).- IPv4 Auto-Configuration of Multi-router Zeroconf Networks with Unique Subnets.- K-Shortest Paths Q-Routing: A New QoS Routing Algorithm in Telecommunication Networks.- Applicability of Resilient Routing Layers for k-Fault Network Recovery.- Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms.- Failover for Mobile Routers: A Vision of Resilient Ambience.- Quality of Service Routing Network and Performance Evaluation.- Ad Hoc Networks (II).- A Partition Prediction Algorithm for Group Mobility in Ad-Hoc Networks.- Routing Cost Versus Network Stability in MANET.- Multipath Energy Efficient Routing in Mobile Ad Hoc Network.- Performance of Service Location Protocols in MANET Based on Reactive Routing Protocols.- A New Scheme for Key Management in Ad Hoc Networks.- TCP (II).- Robust TCP (TCP-R) with Explicit Packet Drop Notification (EPDN) for Satellite Networks.- Adapting TCP Segment Size in Cellular Networks.- AcTMs (Active ATM Switches) with TAP (Trusted and Active PDU Transfers) in a Multiagent Architecture to Better the Chaotic Nature of TCP Congestion Control.- AIMD Penalty Shaper to Enforce Assured Service for TCP Flows.- Routing (II).- Name-Level Approach for Egress Network Access Control.- Efficient Prioritized Service Recovery Using Content-Aware Routing Mechanism in Web Server Cluster.- Queue Management Scheme Stabilizing Buffer Utilization in the IP Router.- Two Mathematically Equivalent Models of the Unique-Path OSPF Weight Setting Problem.- Fault Free Shortest Path Routing on the de Bruijn Networks.- Traffic Control in IP Networks with Multiple Topology Routing.- Ad Hoc Networks (III).- Dynamic Path Control Scheme in Mobile Ad Hoc Networks Using On-Demand Routing Protocol.- On the Capacity of Wireless Ad-Hoc Network Basing on Graph Theory.- Mobile Gateways for Mobile Ad-Hoc Networks with Network Mobility Support.- Energy Consumption in Multicast Protocols for Static Ad Hoc Networks.- Weighted Flow Contention Graph and Its Applications in Wireless Ad Hoc Networks.- Signal Processing.- Automatic Adjustment of Time-Variant Thresholds When Filtering Signals in MR Tomography.- Analytical Design of Maximally Flat Notch FIR Filters for Communication Purposes.- Iterative Decoding and Carrier Frequency Offset Estimation for a Space-Time Block Code System.- Signal Processing for High-Speed Data Communication Using Pure Current Mode Filters.- Current-Mode VHF High-Quality Analog Filters Suitable for Spectral Network Analysis.- Control of Digital Audio Signal Processing over Communication Networks.- Routing (III).- Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers.- A Routing Protocol for Wireless Ad Hoc Sensor Networks: Multi-path Source Routing Protocol (MPSR).- Generalized Secure Routerless Routing.- A Verified Distance Vector Routing Protocol for Protection of Internet Infrastructure.- Replay Attacks in Mobile Wireless Ad Hoc Networks: Protecting the OLSR Protocol.- S-Chord: Hybrid Topology Makes Chord Efficient.- Mobility.- Hierarchical Multi-hop Handoff Architecture for Wireless Network Mobility.- Mobility Adaptation Layer Framework for Heterogeneous Wireless Networks Based on Mobile IPv6.- MiSC: A New Availability Remote Storage System for Mobile Appliance.- A Logical Network Topology Design for Mobile Agent Systems.- Reduced-State SARSA Featuring Extended Channel Reassignment for Dynamic Channel Allocation in Mobile Cellular Networks.- Call Admission Control for Next Generation Cellular Networks Using on Demand Round Robin Bandwidth Sharing.- Performance (I).- Performance Evaluation and Improvement of Non-stable Resilient Packet Ring Behavior.- Load Distribution Performance of the Reliable Server Pooling Framework.- Performance of a Hub-Based Network-Centric Application over the Iridium Satellite Network.- Performance Evaluation of Multichannel Slotted-ALOHA Networks with Buffering.- Towards a Scalable and Flexible Architecture for Virtual Private Networks.- Peer-to-Peer (I).- A Simple, Efficient and Flexible Approach to Measure Multi-protocol Peer-to-Peer Traffic.- Secure Identity and Location Decoupling Using Peer-to-Peer Networks.- Live Streaming on a Peer-to-Peer Overlay: Implementation and Validation.- Distributed Object Location with Queue Management Provision in Peer-to-Peer Content Management Systems.- An Approach to Fair Resource Sharing in Peer-to-Peer Systems.- Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network.- Security (I).- Scalable Group Key Management with Partially Trusted Controllers.- H.323 Client-Independent Security Approach.- Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems.- Active Host Information-Based Abnormal IP Address Detection.- Securing Layer 2 in Local Area Networks.- A Practical and Secure Communication Protocol in the Bounded Storage Model.- Performance (II).- Measuring Quality of Service Parameters over Heterogeneous IP Networks.- Performance Improvement of Hardware-Based Packet Classification Algorithm.- Analyzing Performance Data Exchange in Content Delivery Networks.- Passive Calibration of Active Measuring Latency.- Peer-to-Peer (II).- Application-Level Multicast Using DINPeer in P2P Networks.- Paradis-Net.- Reliable Mobile Ad Hoc P2P Data Sharing.- The Hybrid Chord Protocol: A Peer-to-Peer Lookup Service for Context-Aware Mobile Applications.- LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network.- Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts.- Security (II).- Critical Analysis and New Perspective for Securing Voice Networks.- Architecture of a Server-Aided Signature Service (SASS) for Mobile Networks.- Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).- An Efficient Anonymous Scheme for Mutual Anonymous Communications.- GDS Resource Record: Generalization ofthe Delegation Signer Model.- Secure Initialization Vector Transmission on IP Security.- Multicast (I).- Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery.- Secure Multicast in Micro-Mobility Environments.- Scalability and Robustness of Virtual Multicast for Synchronous Multimedia Distribution.- Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host.- A Group Management Protocol for Mobile Multicast.- CDMA.- Propagation Path Analysis for Location Selection of Base-Station in the Microcell Mobile Communications.- Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks.- A Study on the Cell Sectorization Using the WBTC and NBTC in CDMA Mobile Communication Systems.- DOA-Matrix Decoder for STBC-MC-CDMA Systems.- Erlang Capacity of Voice/Data CDMA Systems with Service Requirements of Blocking Probability and Delay Constraint.- Security and Network Anomaly Detection.- A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.- The Fuzzy Engine for Random Number Generator in Crypto Module.- A Packet Marking Scheme for IP Traceback.- Securing Admission Control in Ubiquitous Computing Environment.- Detecting the Deviations of Privileged Process Execution.- Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts.- Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm.- Multicast (II).- Design of Network Management System Employing Secure Multicast SNMP.- Multi-rate Congestion Control over IP Multicast.- A TCP-Friendly Multicast Protocol Suite for Satellite Networks.- An Enhanced Multicast Routing Protocol for Mobile Hosts in IP Networks.- Analysis of Handover Frequencies for Predictive, Reactive and Proxy Schemes and Their Implications on IPv6 and Multicast Mobility.- Networks.- Design Architectures for 3G and IEEE 802.11 WLAN Integration.- Eliminating the Performance Anomaly of 802.11b.- Energy Efficiency Analysis of IEEE 802.11 DCF with Variable Packet Length.- Scheduling MPEG-4 Video Streams Through the 802.11e Enhanced Distributed Channel Access.- IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput.- Emergency, Disaster, Resiliency.- Some Principles Incorporating Topology Dependencies for Designing Survivable WDM Optical Networks.- Resilient Routing Layers for Network Disaster Planning.- Design of a Service Discovery Architecture for Mobility-Supported Wired and Wireless Networks.- Research on Fuzzy Group Decision Making in Security Risk Assessment.- A Resilient Multipath Routing Protocol for Wireless Sensor Networks.- A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection.- Survivability-Guaranteed Network Resiliency Methods in DWDM Networks.
1997-2024 DolnySlask.com Agencja Internetowa