Conferences in DBLP
Jia Hou , Moon Ho Lee , Ju Yong Park , Jeong Su Kim Decoding Consideration for Space Time Coded MIMO Channel with Constant Amplitude Multi-code System. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1-7 [Conf ] Laurent Cariou , Jean-Francois Helard MIMO Frequency Hopping OFDM-CDMA: A Novel Uplink System for B3G Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:8-17 [Conf ] Cheol Yong Jeon , Yeong Min Jang Transient Capacity Evaluation of UWB Ad Hoc Network with MIMO. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:18-25 [Conf ] Ke Deng , Qinye Yin , Yiwen Zhang , Ming Luo Chip-by-Chip Iterative Multiuser Detection for VBLAST Coded Multiple-Input Multiple-Output Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:26-33 [Conf ] Yun-Lung Chen , Chienhua Chen The Performance Analysis of Two-Class Priority Queueing in MPLS-Enabled IP Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:34-41 [Conf ] Praveen Kumar , Niranjan Dhanakoti , Srividya Gopalan , V. Sridhar Constraint Based LSP Handover (CBLH) in MPLS Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:42-49 [Conf ] Huaqun Guo , Lek Heng Ngoh , Wai-Choong Wong Optimizing Inter-domain Multicast Through DINloop with GMPLS. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:50-57 [Conf ] Jenhui Chen , Chung-Ching Chiou , Shih-Lin Wu A Fast Path Recovery Mechanism for MPLS Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:58-65 [Conf ] Priscila Solís Barreto , Georges Amvame-Nze , C. V. Silva , Juliana Santos Sombra Oliveira , Paulo Henrique Portela de Carvalho , Humberto Abdalla Jr. , Antonio José Martins Soares , Ricardo Staciarini Puttini A Study of Billing Schemes in an Experimental Next Generation Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:66-74 [Conf ] Luo Wen , Jianping Wu , Ke Xu Overlay Logging: An IP Traceback Scheme in MPLS Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:75-82 [Conf ] Remi Badonnel , Radu State , Olivier Festor Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:83-90 [Conf ] Wonjong Noh , Sunshin An Multi-path Routing Using Local Virtual Infrastructure for Large-Scale Mobile Ad-Hoc Networks: Stochastic Optimization Approach. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:91-98 [Conf ] Sebastian Speicher , Clemens H. Cap Candidate Discovery for Connected Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:99-106 [Conf ] Djibo Karimou , Jean Frédéric Myoupo A Fault-Tolerant Permutation Routing Algorithm in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:107-115 [Conf ] Marcos A. de Siqueira , Fabricio L. Figueiredo , Flavia M. F. Rocha , Jose A. Martins , Marcel C. de Castro Policy-Based Dynamic Reconfiguration of Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:116-124 [Conf ] Dhinaharan Nagamalai , Beatrice Cynthia Dhinakaran , Byoung-Sun Choi , Jae-Kwang Lee V-TCP: A Novel TCP Enhancement Technique. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:125-132 [Conf ] Alexander Kesselman , Yishay Mansour Optimizing TCP Retransmission Timeout. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:133-140 [Conf ] Le Tuan Anh , Choong Seon Hong Stable Accurate Rapid Bandwidth Estimate for Improving TCP over Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:141-148 [Conf ] Ziyu Shao , Ting Tong , Jia Jia Liao , Zhengbin Li , Ziyu Wang , Anshi Xu Performance Analysis of TCP Variants over Time-Space-Labeled Optical Burst Switched Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:149-155 [Conf ] Cuneyt Akinlar , A. Udaya Shankar IPv4 Auto-Configuration of Multi-router Zeroconf Networks with Unique Subnets. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:156-163 [Conf ] Said Hoceini , Abdelhamid Mellouk , Yacine Amirat K-Shortest Paths Q-Routing: A New QoS Routing Algorithm in Telecommunication Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:164-172 [Conf ] Tarik Cicic , Audun Fosselie Hansen , Stein Gjessing , Olav Lysne Applicability of Resilient Routing Layers for k-Fault Network Recovery. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:173-183 [Conf ] Guozhen Tan , Dong Li , Xiaohui Ping , Ningning Han , Yi Liu Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:184-191 [Conf ] Eranga Perera , Aruna Seneviratne , Roksana Boreli , Michael Eyrich , Michael Wolf , Tim Leinmüller Failover for Mobile Routers: A Vision of Resilient Ambience. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:192-201 [Conf ] Shen Lin , Yong Cui , Mingwei Xu , Ke Xu Quality of Service Routing Network and Performance Evaluation. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:202-209 [Conf ] Nam-koo Ha , Byeong-Jik Lee , Kyung-jun Kim , Ki Jun Han A Partition Prediction Algorithm for Group Mobility in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:210-217 [Conf ] Huda Md. Nurul , Shigeki Yamada , Eiji Kamioka Routing Cost Versus Network Stability in MANET. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:218-225 [Conf ] Shouyi Yin , Xiaokang Lin Multipath Energy Efficient Routing in Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:226-233 [Conf ] Hyun-Gon Seo , Ki-Hyung Kim , Won-Do Jung , Jun-Sung Park , Seung-Hwan Jo , Chang-Min Shin , Seung-Min Park , Heung-Nam Kim Performance of Service Location Protocols in MANET Based on Reactive Routing Protocols. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:234-241 [Conf ] Guangsong Li , Wenbao Han A New Scheme for Key Management in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:242-249 [Conf ] Arjuna Sathiaseelan , Tomasz Radzik Robust TCP (TCP-R) with Explicit Packet Drop Notification (EPDN) for Satellite Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:250-257 [Conf ] Jin-Hee Choi , Jin-Ghoo Choi , Chuck Yoo Adapting TCP Segment Size in Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:258-265 [Conf ] José Luis González Sánchez , Jordi Domingo-Pascual , João Chambel Vieira AcTMs (Active ATM Switches) with TAP (Trusted and Active PDU Transfers) in a Multiagent Architecture to Better the Chaotic Nature of TCP Congestion Control. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:266-274 [Conf ] Emmanuel Lochin , Pascal Anelli , Serge Fdida AIMD Penalty Shaper to Enforce Assured Service for TCP Flows. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:275-283 [Conf ] Shinichi Suzuki , Yasushi Shinjo , Toshio Hirotsu , Kazuhiko Kato , Kozo Itano Name-Level Approach for Egress Network Access Control. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:284-296 [Conf ] Euisuk Kang , Sook-Heon Lee , Myong-Soon Park Efficient Prioritized Service Recovery Using Content-Aware Routing Mechanism in Web Server Cluster. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:297-306 [Conf ] Yusuke Shinohara , Norio Yamagaki , Hideki Tode , Koso Murakami Queue Management Scheme Stabilizing Buffer Utilization in the IP Router. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:307-317 [Conf ] Changyong Zhang , Robert Rodosek Two Mathematically Equivalent Models of the Unique-Path OSPF Weight Setting Problem. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:318-326 [Conf ] Ngoc Chi Nguyen , Nhat Minh Dinh Vo , Sungyoung Lee Fault Free Shortest Path Routing on the de Bruijn Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:327-334 [Conf ] Ljiljana Adamovic , Karol Kowalik , Martin Collier Traffic Control in IP Networks with Multiple Topology Routing. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:335-342 [Conf ] Jihoon Lee , Wonjong Noh Dynamic Path Control Scheme in Mobile Ad Hoc Networks Using On-Demand Routing Protocol. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:343-352 [Conf ] Qin-yun Dai , Xiu-lin Hu , Hong-Yi Yu , Jun Zhao On the Capacity of Wireless Ad-Hoc Network Basing on Graph Theory. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:353-360 [Conf ] Ryuji Wakikawa , Hiroki Matsutani , Rajeev Koodli , Anders Nilsson , Jun Murai Mobile Gateways for Mobile Ad-Hoc Networks with Network Mobility Support. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:361-368 [Conf ] Sangman Moh Energy Consumption in Multicast Protocols for Static Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:369-376 [Conf ] Guo-kai Zeng , Yin-long Xu , Ya-feng Wu , Xi Wang Weighted Flow Contention Graph and Its Applications in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:377-383 [Conf ] Eva Gescheidtova , Radek Kubasek , Zdenek Smékal , Karel Bartusek Automatic Adjustment of Time-Variant Thresholds When Filtering Signals in MR Tomography. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:384-391 [Conf ] Pavel Zahradnik , Miroslav Vlcek , Boris Simák Analytical Design of Maximally Flat Notch FIR Filters for Communication Purposes. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:392-400 [Conf ] Ming Luo , Qinye Yin , Le Ding , Yiwen Zhang Iterative Decoding and Carrier Frequency Offset Estimation for a Space-Time Block Code System. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:401-409 [Conf ] Ivo Lattenberg , Kamil Vrba , David Kubanek Signal Processing for High-Speed Data Communication Using Pure Current Mode Filters. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:410-416 [Conf ] Kamil Vrba , Radek Sponar , David Kubanek Current-Mode VHF High-Quality Analog Filters Suitable for Spectral Network Analysis. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:417-424 [Conf ] Jiri Schimmel , Petr Sysel Control of Digital Audio Signal Processing over Communication Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:425-432 [Conf ] Xiaozhe Zhang , Peidong Zhu , Xicheng Lu Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:433-441 [Conf ] Mounir Achir , Laurent Ouvry A Routing Protocol for Wireless Ad Hoc Sensor Networks: Multi-path Source Routing Protocol (MPSR). [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:442-453 [Conf ] Vince Grolmusz , Zoltán Király Generalized Secure Routerless Routing. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:454-462 [Conf ] Liwen He A Verified Distance Vector Routing Protocol for Protection of Internet Infrastructure. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:463-470 [Conf ] Eli Winjum , Anne Marie Hegland , Øivind Kure , Pål Spilling Replay Attacks in Mobile Wireless Ad Hoc Networks: Protecting the OLSR Protocol. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:471-479 [Conf ] Hui-shan Liu , Ke Xu , Mingwei Xu , Yong Cui S-Chord: Hybrid Topology Makes Chord Efficient. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:480-487 [Conf ] Yunkuk Kim , Sangwook Kang , Donghyun Chae , Sunshin An Hierarchical Multi-hop Handoff Architecture for Wireless Network Mobility. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:488-495 [Conf ] Norbert Jordan , Alexander Poropatich , Joachim Fabini Mobility Adaptation Layer Framework for Heterogeneous Wireless Networks Based on Mobile IPv6. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:496-503 [Conf ] Joo-Ho Kim , Bo-Seok Moon , Myong-Soon Park MiSC: A New Availability Remote Storage System for Mobile Appliance. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:504-520 [Conf ] Kazuhiko Kinoshita , Nariyoshi Yamai , Koso Murakami A Logical Network Topology Design for Mobile Agent Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:521-530 [Conf ] Nimrod Lilith , Kutluyil Dogancay Reduced-State SARSA Featuring Extended Channel Reassignment for Dynamic Channel Allocation in Mobile Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:531-542 [Conf ] Kyungkoo Jun , Seokhoon Kang Call Admission Control for Next Generation Cellular Networks Using on Demand Round Robin Bandwidth Sharing. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:543-550 [Conf ] Fredrik Davik , Amund Kvalbein , Stein Gjessing Performance Evaluation and Improvement of Non-stable Resilient Packet Ring Behavior. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:551-563 [Conf ] Thomas Dreibholz , Erwin P. Rathgeb , Michael Tüxen Load Distribution Performance of the Reliable Server Pooling Framework. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:564-574 [Conf ] Margaret M. McMahon , Eric C. Firkin Performance of a Hub-Based Network-Centric Application over the Iridium Satellite Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:575-584 [Conf ] Sebastià Galmés , Ramón Puigjaner Performance Evaluation of Multichannel Slotted-ALOHA Networks with Buffering. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:585-596 [Conf ] Shashank Khanvilkar , Ashfaq A. Khokhar Towards a Scalable and Flexible Architecture for Virtual Private Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:597-605 [Conf ] Holger Bleul , Erwin P. Rathgeb A Simple, Efficient and Flexible Approach to Measure Multi-protocol Peer-to-Peer Traffic. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:606-616 [Conf ] Stephen Herborn , Tim Hsin-Ting Hu , Roksana Boreli , Aruna Seneviratne Secure Identity and Location Decoupling Using Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:617-624 [Conf ] Joaquín Caraballo Moreno , Olivier Fourmaux Live Streaming on a Peer-to-Peer Overlay: Implementation and Validation. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:625-633 [Conf ] Vassilios M. Stathopoulos , Nikolaos D. Dragios , Nikolas Mitrou Distributed Object Location with Queue Management Provision in Peer-to-Peer Content Management Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:634-642 [Conf ] Yongquan Ma , Dongsheng Wang An Approach to Fair Resource Sharing in Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:643-652 [Conf ] Tim Schattkowsky Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:653-661 [Conf ] Himanshu Khurana , Rafael Bonilla , Adam J. Slagell , Raja Afandi , Hyung-Seok Hahm , Jim Basney Scalable Group Key Management with Partially Trusted Controllers. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:662-672 [Conf ] Lubomir Cvrk , Vaclav Zeman , Dan Komosny H.323 Client-Independent Security Approach. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:673-680 [Conf ] Vladimir S. Zaborovskii , Y. A. Shemanin , Andrey Rudskoy Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:681-688 [Conf ] Gaeil Ahn , Kiyoung Kim Active Host Information-Based Abnormal IP Address Detection. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:689-698 [Conf ] Hayriye Altunbasak , Sven Krasser , Henry L. Owen , Jochen Grimminger , Hans-Peter Huth , Joachim Sokol Securing Layer 2 in Local Area Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:699-706 [Conf ] Erkay Savas , Berk Sunar A Practical and Secure Communication Protocol in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:707-717 [Conf ] Antonio Pescapè , Luca Vollero , Giulio Iannello , Giorgio Ventre Measuring Quality of Service Parameters over Heterogeneous IP Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:718-727 [Conf ] Yaw-Chung Chen , Pi-Chung Wang , Chun-Liang Lee , Chia-Tai Chan Performance Improvement of Hardware-Based Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:728-736 [Conf ] Davide Rossi , Elisa Turrini Analyzing Performance Data Exchange in Content Delivery Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:737-745 [Conf ] Jianping Yin , Zhiping Cai , Wentao Zhao , Xianghui Liu Passive Calibration of Active Measuring Latency. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:746-753 [Conf ] Huaqun Guo , Lek Heng Ngoh , Wai-Choong Wong Application-Level Multicast Using DINPeer in P2P Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:754-761 [Conf ] Guido Malpohl , Florin Isaila Paradis-Net. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:762-771 [Conf ] Mee Young Sung , Jong Hyuk Lee , Jong Seung Park , Seung Sik Choi , Sungtek Kahng Reliable Mobile Ad Hoc P2P Data Sharing. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:772-780 [Conf ] Stefan Zöls , Rüdiger Schollmeier , Wolfgang Kellerer , Anthony Tarlano The Hybrid Chord Protocol: A Peer-to-Peer Lookup Service for Context-Aware Mobile Applications. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:781-792 [Conf ] Xicheng Lu , Qianbing Zheng , Peidong Zhu , Wei Peng LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:793-799 [Conf ] Chris Loeser , Gunnar Schomaker , André Brinkmann , Mario Vodisek , Michael Heidebuer Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:800-809 [Conf ] Carole Bassil , Ahmed Serhrouchni , Nicolas Rouhana Critical Analysis and New Perspective for Securing Voice Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:810-818 [Conf ] Liang Cai , Xiaohu Yang , Chun Chen Architecture of a Server-Aided Signature Service (SASS) for Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:819-826 [Conf ] Duncan S. Wong , Agnes Hui Chan , Feng Zhu Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:827-834 [Conf ] Ray-I Chang , Chih-Chun Chu An Efficient Anonymous Scheme for Mutual Anonymous Communications. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:835-843 [Conf ] Gilles Guette , Bernard Cousin , David Fort GDS Resource Record: Generalization ofthe Delegation Signer Model. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:844-851 [Conf ] Yoon-Jung Rhee Secure Initialization Vector Transmission on IP Security. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:852-858 [Conf ] Takeshi Takahashi , Koichi Asatani , Hideyoshi Tominaga Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router Discovery. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:859-867 [Conf ] Ho Seok Kang , Young-Chul Shim Secure Multicast in Micro-Mobility Environments. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:868-875 [Conf ] Petr Holub , Eva Hladká , Ludek Matyska Scalability and Robustness of Virtual Multicast for Synchronous Multimedia Distribution. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:876-883 [Conf ] Jae Keun Park , Sung Je Hong , Jong Kim Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:884-891 [Conf ] Hidetoshi Ueno , Hideharu Suzuki , Norihiro Ishikawa A Group Management Protocol for Mobile Multicast. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:892-903 [Conf ] Sun-Kuk Noh , Dong-You Choi , Chang-kyun Park Propagation Path Analysis for Location Selection of Base-Station in the Microcell Mobile Communications. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:904-911 [Conf ] Fei Yu , Vikram Krishnamurthy Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:912-919 [Conf ] Dong-You Choi , Sun-Kuk Noh A Study on the Cell Sectorization Using the WBTC and NBTC in CDMA Mobile Communication Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:920-927 [Conf ] Yanxing Zeng , Qinye Yin , Le Ding , Jianguo Zhang DOA-Matrix Decoder for STBC-MC-CDMA Systems. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:928-935 [Conf ] Insoo Koo , Jeongrok Yang , Kiseon Kim Erlang Capacity of Voice/Data CDMA Systems with Service Requirements of Blocking Probability and Delay Constraint. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:936-943 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:944-952 [Conf ] Jinkeun Hong The Fuzzy Engine for Random Number Generator in Crypto Module. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:953-963 [Conf ] Haipeng Qu , Purui Su , Dongdai Lin , Dengguo Feng A Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:964-971 [Conf ] Jong-Phil Yang , Kyung Hyune Rhee Securing Admission Control in Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:972-979 [Conf ] Purui Su , Dequan Li , Haipeng Qu , Dengguo Feng Detecting the Deviations of Privileged Process Execution. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:980-988 [Conf ] Zonghua Zhang , Hong Shen Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:989-996 [Conf ] Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:997-1002 [Conf ] Deuk-Whee Kwak , Jongwon Kim Design of Network Management System Employing Secure Multicast SNMP. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1003-1011 [Conf ] Yuliang Li , Alistair Munro , Dritan Kaleshi Multi-rate Congestion Control over IP Multicast. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1012-1022 [Conf ] Giacomo Morabito , Sergio Palazzo , Antonio Pantò A TCP-Friendly Multicast Protocol Suite for Satellite Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1023-1030 [Conf ] Seung-Jei Yang , Sung-Han Park An Enhanced Multicast Routing Protocol for Mobile Hosts in IP Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1031-1038 [Conf ] Thomas C. Schmidt , Matthias Wählisch Analysis of Handover Frequencies for Predictive, Reactive and Proxy Schemes and Their Implications on IPv6 and Multicast Mobility. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1039-1046 [Conf ] Farhan Siddiqui , Sherali Zeadally , Ece Yaprak Design Architectures for 3G and IEEE 802.11 WLAN Integration. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1047-1054 [Conf ] See-hwan Yoo , Jin-Hee Choi , Jae-Hyun Hwang , Chuck Yoo Eliminating the Performance Anomaly of 802.11b. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1055-1062 [Conf ] Bo Gao , Yuhang Yang , Huiye Ma Energy Efficiency Analysis of IEEE 802.11 DCF with Variable Packet Length. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1063-1070 [Conf ] Michael Ditze , Kay Klobedanz , Guido Kämper , Peter Altenbernd Scheduling MPEG-4 Video Streams Through the 802.11e Enhanced Distributed Channel Access. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1071-1079 [Conf ] Namgi Kim , Sunwoong Choi , Hyunsoo Yoon IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1080-1087 [Conf ] Sungwoo Tak Some Principles Incorporating Topology Dependencies for Designing Survivable WDM Optical Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1088-1096 [Conf ] Audun Fosselie Hansen , Amund Kvalbein , Tarik Cicic , Stein Gjessing Resilient Routing Layers for Network Disaster Planning. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1097-1105 [Conf ] Hyun-Gon Seo , Ki-Hyung Kim Design of a Service Discovery Architecture for Mobility-Supported Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1106-1113 [Conf ] Fang Liu , Kui Dai , Zhiying Wang , Jun Ma Research on Fuzzy Group Decision Making in Security Risk Assessment. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1114-1121 [Conf ] Ki-Hyung Kim , Won-Do Jung , Jun-Sung Park , Hyun-Gon Seo , Seung-Hwan Jo , Chang-Min Shin , Seung-Min Park , Heung-Nam Kim A Resilient Multipath Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1122-1129 [Conf ] Lothar Fritsch , Tobias Scherner A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1130-1137 [Conf ] Jin-Ho Hwang , Won Kim , Jun-Won Lee , Sung Un Kim Survivability-Guaranteed Network Resiliency Methods in DWDM Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:1138-1145 [Conf ]