NETWORKING 2010 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings /

This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramC...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Crovella, Mark (Επιμελητής έκδοσης), Feeney, Laura Marie (Επιμελητής έκδοσης), Rubenstein, Dan (Επιμελητής έκδοσης), Raghavan, S. V. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6091
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06394nam a22005895i 4500
001 978-3-642-12963-6
003 DE-He213
005 20151204170846.0
007 cr nn 008mamaa
008 100426s2010 gw | s |||| 0|eng d
020 |a 9783642129636  |9 978-3-642-12963-6 
024 7 |a 10.1007/978-3-642-12963-6  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a NETWORKING 2010  |h [electronic resource] :  |b 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings /  |c edited by Mark Crovella, Laura Marie Feeney, Dan Rubenstein, S. V. Raghavan. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 |a XVI, 410 p. 181 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6091 
505 0 |a P2P and Overlay Networks -- Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-Assisted Content Delivery Systems -- Network Distance Prediction Based on Decentralized Matrix Factorization -- Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding -- Survivable Virtual Network Embedding -- Toward Efficient On-Demand Streaming with BitTorrent -- Synapse: A Scalable Protocol for Interconnecting Heterogeneous Overlay Networks -- Performance Measurement -- A Longitudinal Study of Small-Time Scaling Behavior of Internet Traffic -- Measurement Study of Multi-party Video Conferencing -- Quality of Service -- Passive Online RTT Estimation for Flow-Aware Routers Using One-Way Traffic -- A Flow Scheduler Architecture -- Stateless RD Network Services -- Wireless Networks -- Multicast in Multi-channel Wireless Mesh Networks -- Ambient Interference Effects in Wi-Fi Networks -- A Zone Assignment Algorithm for Fractional Frequency Reuse in Mobile WiMAX Networks -- Addressing and Routing -- Handling Transient Link Failures Using Alternate Next Hop Counters -- Efficient Recovery from False State in Distributed Routing Algorithms -- IP Fast Reroute in Networks with Shared Risk Links -- EAU: Efficient Address Updating for Seamless Handover in Multi-homed Mobile Environments -- Applications and Services -- Speculative Validation of Web Objects for Further Reducing the User-Perceived Latency -- Dynamic Service Placement in Shared Service Hosting Infrastructures -- Evaluating the Impact of a Novel Warning Message Dissemination Scheme for VANETs Using Real City Maps -- Ad Hoc and Sensor Networks -- Resource Optimization Algorithm for Sparse Time-Driven Sensor Networks -- Routing Protocol for Anycast Communications in a Wireless Sensor Network -- Fault-Tolerant Power-Aware Topology Control for Ad-Hoc Wireless Networks -- Work in Progress -- Server Guaranteed Cap: An Incentive Mechanism for Maximizing Streaming Quality in Heterogeneous Overlays -- End-to-End Throughput with Cooperative Communication in Multi-channel Wireless Networks -- Cost Bounds of Multicast Light-Trees in WDM Networks -- Bidirectional Range Extension for TCAM-Based Packet Classification -- Estimating the Economic Value of Flexibility in Access Network Unbundling -- Intercarrier Compensation between Providers of Different Layers: Advantages of Transmission Initiator Determination -- Application of Secondary Information for Misbehavior Detection in VANETs -- Path Attestation Scheme to Avert DDoS Flood Attacks. 
520 |a This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramCommittee (TPC); there was no attempt to enforce a quota among topic areas. We believe the resulting program is an excellentrepresentationofthebreadthofrecentadvancesinnetworkingresearch. This year, the conference received 101 full paper submissions from 23 co- trieson?vecontinents,re?ectingastrongdiversityinthenetworkingcommunity. Similarly, the 92 members of the TPC are from 21 countries and include a mix of academic, industry, and governmental a?liations. The TPC members, aided by some 50 external reviewers, provided a total of 470 reviews and follow-up discussions totaling more than 200 messages. The ?nal selections were made at a TPC meeting hosted by Columbia University in New York City, with both in-person and remote participation. In total, authors of accepted papers have academic and industry a?liations in 15 countries. We ?nally selected 24papers for presentationduring the conference technical sessions. A small number of papers were assigned a shepherd from the TPC to assist in paper revision. These statistics represent an acceptance rate of just under 24%, comparable to that of previous years. The TPC also identi?ed several papers that re?ect particularly promising early results; these papers were selected for presentation as work-in-progress papers and are identi?ed as such in the proceedings. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Software Engineering/Programming and Operating Systems. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Data Encryption. 
700 1 |a Crovella, Mark.  |e editor. 
700 1 |a Feeney, Laura Marie.  |e editor. 
700 1 |a Rubenstein, Dan.  |e editor. 
700 1 |a Raghavan, S. V.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642129629 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6091 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12963-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)