direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Es gibt keine deutsche Übersetzung dieser Webseite.

Publications by Type: Conference and Workshop Publications

see also conference papers, workshop papers, demos, and posters. (under construction)

<< zurück [1]
vor >> [13]

2006

Moscibroda, Thomas and Schmid, Stefan and Wattenhofer, Roger (2006). On the Topologies Formed by Selfish Peers [17]. 5th International Workshop on Peer-to-Peer Systems (IPTPS), 133–142.


Scott, James and Hui, Pan and Crowcroft, Jon and Diot, Christophe (2006). Haggle: A Networking Architecture Designed Around Mobile Users [18]. Proceedings of the Annual Conference on Wireless On demand Network Systems and Services (WONS '06). IEEE.


Agarwal, Sachin and Laifenfeld, Moshe and Trachtenberg, Ari and Alanyali, Murat (2006). Using bandwidth sharing to fairly overcome channel asymmetry [19]. Information Theory and Applications Workshop


Agarwal, Sachin (2006). Achievability of an Incentive Mechanism for Gossip based Peer-to-Peer Streaming [20]. Workshop on Recent advances in Peer-to-Peer Streaming


Agarwal, Sachin (2006). Intelligent content caching for mobile devices [21]. 13th International Conference on Telecommunications (ICT)


Kammenhuber, Nils and Luxenburger, Julia and Feldmann, Anja and Weikum, Gerhard (2006). Web search clickstreams [22]. IMC '06: Proceedings of the 6th ACM SIGCOMM on Internet measurement. ACM Press, 245–250.


Dreger, Holger and Feldmann, Anja and Mai, Michael and Paxson, Vern and Sommer, Robin (2006). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection [23]. Proceedings of the 15th Usenix Security Symposium. USENIX Association, 257–272.


Merz, Ruben and El Fawal, Alaeddine and Le Boudec, Jean-Yves and Radunovic, Bozidar and Widmer, Jörg (2006). The Optimal MAC Layer for Low-Power UWB is Non-Coordinated [24]. IEEE International Symposium on Circuits and Systems (ISCAS 2006), 2429–2432.


Chaintreau, Augustin and Hui, Pan and Crowcroft, Jon and Diot, Christophe and Gass, Richard and Scott, James (2006). Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms [25]. Proceedings of IEEE International Conference on Computer Communication (INFOCOM '06)


Agarwal, Sachin and Laifenfeld, Moshe and Trachtenberg, Ari and Alanyali, Murat (2006). Fast data access over asymmetric channels using fair and secure bandwidth sharing [26]. 26th IEEE International Conference on Distributed Computing Systems (ICDCS)


2005

Aggarwal, Vinay and Feldmann, Anja and Mohr, Sebastian (2005). Implementation of a P2P system within a network simulation framework [27]. European Conference on Complex Systems (ECCS), P2P-Complex Workshop


Iannone, Luigi and Fdida, Serge (2005). MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks [28]. CoNEXT '05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology. ACM, 21–30.


Schneider, Fabian and Wallerich, Jörg (2005). Performance evaluation of packet capturing systems for high-speed networks [29]. CoNEXT'05 Student Workshop: Proceedings of the 2005 ACM conference on Emerging network experiment and technology (poster session). ACM Press, 284–285.


Merz, Ruben and Le Boudec, Jean-Yves (2005). Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM [30]. Proceedings of the Second International Conference on Broadband Networks (Broadnets '05), 1156–1162.


Hui, Pan and Chaintreau, Augustin and Gass, Richard and Scott, James and Crowcroft, Jon and Diot, Christophe (2005). Pocket Switched Networking: Challenges, Feasibility, and Implementation Issues [31]. Proceedings of the 2nd IFIP TC6 International Workshop on Autonomic Communication (WAC '05). Springer.


Mehmood, Amir and Jadoon, Tariq M. and Sheikh, Noor M. (2005). Assessment of VoIP Quality over Access Networks [32]. ICI'05: Proceedings of The First IEEE and IFIP International Conference in Central Asia on Internet, 26–29.


Mehmood, Amir and Jadoon, Tariq and Sheikh, Noor (2005). Evaluation of VoIP Quality over the Pakistan Internet Exchange (PIE) Back Bone [33]. ICET'05: Proceedings of the IEEE Symposium on Emerging Technologies, 2005, 258–263.


Karrer, Roger and Knightly, Edward (2005). TCP-PARIS: a Parallel Download Protocol for Replicas [34]. IEEE International Workshop on Web Content Caching and Distribution (WCW '05), 15–25.


Merz, Ruben and Le Boudec, Jean-Yves (2005). Conditional Bit Error Rate for an Impulse Radio UWB Channel with Interfering Users [35]. IEEE International Conference on Ultra-Wideband (ICU '05), 130–135.


Hui, Pan and Chaintreau, Augustin and Scott, James and Gass, Richard and Crowcroft, Jon and Diot, Christophe (2005). Pocket Switched Networks and the Consequences of Human Mobility in Conference Environments [36]. Proceedings of the Workshop on Delay Tolerant Networks (WDTN '05). ACM.


Iannone, Luigi and Fdida, Serge (2005). MeshDV: A Distance Vector mobility-tolerant routing protocol for Wireless Mesh Networks [37]. REALMAN '05: Proceedings of the 1st international workshop on Multi-hop ad hoc networks: from theory to reality, 111–118.


Iannone, Luigi and Fdida, Serge (2005). Can Multi-rate Radios reduce end-to-end delay in mesh networks? A simulation case study [38]. MESH NETWORKING: Realizing the Wireless Internet (Meshnets '05)


Sachpazidis, Ilias and Hohlfeld, Oliver (2005). Implementation of a Jabber-Based Medical Tele-Consulting Application [39]. Proceedings of the 5th International Network Conference (INC), 527–534.


Karrer, Roger and Gross, Thomas (2005). Application-oriented communication for networked systems [40]. 11th IEEE International Conference on Parallel and Distributed Systems (ICPADS '05). IEEE ComSoc, 695–701.


Attie, Paul and Guerraoui, Rachid and Kouznetsov, Petr and Lynch, Nancy and Rajsbaum, Sergio (2005). The Impossibility of Boosting Distributed Service Resilience [41]. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), 39–48.


Ciucu, Florin and Burchard, Almut and Liebeherr, Jorg (2005). A Network Service Curve Approach for the Stochastic Analysis of Networks [42]. Proceedings of ACM SIGMETRICS 2005. ACM, 279–290.


von Rickenbach, Pascal and Schmid, Stefan and Wattenhofer, Roger and Zollinger, Aaron (2005). A Robust Interference Model for Wireless Ad-Hoc Networks [43]. 5th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN), 1–8.


Iannone, Luigi and Fdida, Serge (2005). SDT.11b : Un Schéma à Division de Temps pour éviter l'anomalie de la couche MAC 802.11b [44]. Colloque Francophone sur l'Ingénierie des Protocoles (CFIP '05)


Iannone, Luigi and Fdida, Serge (2005). Increasing the Throughput Capacity of Mesh Networks by Cross-layer Routing [45]. Student Workshop of the 24th Annual IEEE Conference on Computer Communications (IEEE INFOCOM '05 Student Workshop, poster session)


Kuhn, Fabian and Schmid, Stefan and Wattenhofer, Roger (2005). A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn [46]. 4th International Workshop on Peer-To-Peer Systems (IPTPS). Springer, 13–23.


Kencl, Lukas and Kammenhuber, Nils (2005). Efficient Statistics Gathering from Tree-Search Methods in Packet Processing Systems [47]. Proceedings of the 2005 IEEE International Conference in Communications (ICC 2005). IEEE, 1483–1489.


Sachpazidis, Ilias and Hohlfeld, Oliver (2005). Instant Messaging Communication Gateway for Medical Applications [48]. Proceedings of the IASTED International Conference on Telehealth. ACTA Press, 12–16.


Dreger, Holger and Kreibich, Christian and Paxson, Vern and Sommer, Robin (2005). Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context [49]. Proceedings of the 2nd GI Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005)


Aggarwal, Vinay and Feldmann, Anja and Gaertler, Marco and Görke, Robert and Wagner, Dorothea and Shavitt, Yuval and Shir, Eran and Wichmann, Arne (2005). Analytic Visualizations and their Applications for the Autonomous System Graph [50]. European Conference on Complex Systems (ECCS, poster session), 949.


Attiya, Hagit and Guerraoui, Rachid and Kouznetsov, Petr (2005). Computing with Reads and Writes in the Absence of Step Contention [51]. Proceedings of the 19th International Conference on Distributed Computing (DISC '05). Springer, 122–136.


Kornexl, Stefan and Paxson, Vern and Dreger, Holger and Feldmann, Anja and Sommer, Robin (2005). Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic [52]. IMC '05: Proceedings of the 5th ACM SIGCOMM Internet Measurement Conference. ACM Press, 267–272.


Kreibich, Christian and Sommer, Robin (2005). Policy-Controlled Event Management for Distributed Intrusion Detection [53]. ICDCSW '05: Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). IEEE Computer Society, 385–391.


Sommer, Robin and Paxson, Vern (2005). Exploiting Independent State For Network Intrusion Detection [54]. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05). IEEE Computer Society, 59–71.


2004

Iannone, Luigi and Benbadis, Farid and Dias de Amorim, Marcelo and Fdida, Serge (2004). Quelques Applications des réseaux de capteurs (Some applications of wireless sensor networks) [55]. Dans les actes des Journées Scientifiques Techniques CetMet (Centre d'Etudes Techniques Maritimes et Fluviales)


Barman, Dhiman and Smaragdakis, Georgios and Matta, Ibrahim (2004). The Effect of Router Buffer Size on HighSpeed TCP Performance [56]. Proceedings of 2004 IEEE Global Telecommunications Conference, (GLOBECOM '04), 1617–1621.


Le Boudec, Jean-Yves and Merz, Ruben and Radunovic, Bozidar and Widmer, Jörg (2004). DCC-MAC: A Decentralized MAC Protocol for 802.15.4a-like UWB Mobile Ad-Hoc Networks Based on Dynamic Channel Coding [57]. Proceedings of the First International Conference on Broadband Networks (Broadnets'04). IEEE Computer Society, 396–405.


Iannone, Luigi and Khalili, Ramin and Salamatian, Kave and Fdida, Serge (2004). Cross-Layer Routing in Wireless Mesh Networks [58]. The First International Symposium in Wireless Communication Systems (ISWCS '04), 319–323.


Ashby, Shaun and Eulisse, Giulio and Schmid, Stefan and Tuura, Lassi (2004). Parallel Compilation of CMS Software [59]. Computing in High Energy and Nuclear Physics Conference (CHEP)


Aggarwal, Vinay and Bender, Stefan and Feldmann, Anja and Wichmann, Arne (2004). Methodology for Estimating Network Distances of Gnutella Neighbors. [60]. INFORMATIK 2004 – Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung der Gesellschaft für Informatik e.V. (GI). GI, 219–223.


Smaragdakis, Georgios and Matta, Ibrahim and Bestavros, Azer (2004). SEP: A Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks [61]. Proceedings of Second International Workshop on Sensor and Actor Network Protocols and Applications (SANPA 2004)


Feldmann, Anja and Kong, Hongwei and Maennel, Olaf and Tudor, Alexander (2004). Measuring BGP Pass-Through Times. [62]. PAM. Springer, 267–277.


Eugster, Patrick Thomas and Guerraoui, Rachid and Kouznetsov, Petr (2004). Δ-Reliability: A Probabilistic Measure of Broadcast Reliability [63]. Proceedings of the 24th IEEE International Conference on Distributed Computing Systems (ICDCS 2004), 636–643.


Feldmann, Anja and Kammenhuber, Nils and Maennel, Olaf and Maggs, Bruce and De Prisco, Roberto and Sundaram, Ravi (2004). A methodology for estimating interdomain web traffic demand [64]. IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM Press, 322–335.


Delporte-Gallet, Carole and Fauconnier, Hugues and Hadzilacos, Vassos and Guerraoui, Rachid and Kouznetsov, Petr and Toueg, Sam (2004). The Weakest Failure Detectors to Solve Certain Fundamental Problems in Distributed Computing [65]. Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC '04). ACM, 338–346.


Dreger, Holger and Feldmann, Anja and Paxson, Vern and Sommer, Robin (2004). Operational Experiences with High-Volume Network Intrusion Detection [66]. CCS '04: Proceedings of the 11th ACM conference on Computer and communications security. ACM Press, 2–11.


<< zurück [67]
vor >> [79]

Under Construction

This page/section is
still under construc-
tion. Please try again
later.
------ Links: ------

Zusatzinformationen / Extras

Direktzugang:

Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008