9:50 | Rex Min and Piyada Phanaphat, | Energy-Efficient Communication for Ad-hoc Microsensor Networks |
10:10 | Mansim Connie Cheng, Kenneth Yu | Port Agility - a censorship-resilient wrapping protocol |
10:30 | Napoleon Nelson, Gautam Jayaraman | Chord-based Membership and Lookup for Application-Level Multicast |
10:50 | Gary Look, Rattapoom (Pipe) Tuchinda | Using INS to support a multi-agent software system |
11:10 | Philippe Cheng, Tina
Wang | Beacon Autoconfiguration in Cricket |
11:30 | John Gu, David Bailey | Robustness of Chord |
11:50 | Peter Portante, Ed Suh, Jason
Dettbarn | Bandwidth Allocation in the Congestion Manager |
1:00 | Paul Tasillo | Asymmetric
Routing in the Internet |
1:20 | Dimitris Vyzovitis, Junius Ho,
Angus Huang | Self-Stabilizing Behavior of Peer-To-Peer Lookup
Algorithms |
1:40 | Noshirwan Petigara, Delfine
Nain | Using Node Mobility and Storage to Improve Connectivity
in Mobile Ad Hoc Networks |
2:00 | Timo Burkard | A
distributed peer-to-peer web crawler |
2:20 | Terrence Poon, Marco
Escobedo | Evaluating TFRC as Congestion Control for Streaming
Video |
3:00 | Haiyang Liu, Ji
Li | Improving Scalable Packet Classification by Aggregating and
Folding |
3:30 | Indraneel Chakraborty, George
Lee, Ben Leong | Wireless Service Selection for the ANA Personal
Router |
3:50 | Frank Dabek, Josh Cates | Congestion Control for Widely Distributed Striped Data |
4:10 | Iris Baron, Jacob Strauss | Relations between Packet Bunches and Available Bandwidth |
4:30 | Matthew Lepinski and Hanson Zhou | Improved Fault Tolerance in a Content-Addressable Network |
4:50 | Neil Chungfat, Raffi Krikorian | Simulation of a Zero Configuration Network Protocol |
5:10 | Rich Moy, Sanjay Raman | Distributed and Load-Balanced Routing in Wireless Ad-Hoc Networks |
9:30 | Kalpak Kothari and Nikolaos
Michalakis | An Efficient Late-binding Mechanism in
Twine |
9:50 | Russ Cox and Athicha Muthitacharoen | Serving DNS using a Peer to Peer Lookup Service |
10:30 | Todd Nightingale, Stan Rost | Multipath Routing in Simulated RONs |
10:50 | Min Wu, Omar Bakr | Peer-to-Peer DNS infrastructure againt DoS attacks |
11:10 | Brendan Kao, Nii Latrey
Dodoo | iMPTCP: A Multipath Routing Protocol |
11:30 | Michael Artz, Jon Salz | Transparent Extensible Session-Layer Architecture |
11:50 | Hu Imm Lee | Routing
Around Malicious Nodes in Ad Hoc Wireless Networks |
1:00 | Aaron Beals, Matthew Hausmann | A Packet-Pooling Mechanism for Improving Throughput |
1:20 | Mingyang Xu, Yi Zhang | An Agile Protocol for Censor-Resistant Networks |
1:40 | Ronny Krashinsky | Saving Energy while Maintaining Performance on Wireless LANs |
2:00 | Rodrigo Rodrigues, Pedro Ferreira | Using Traceroute Servers to Characterize Traffic Behavior in the Internet |
2:20 | David West | Implementation Issues of 8-bit TCP/IP Stacks on the Z80 based TI-86 |
2:40 | Elie Krevat, Arian
Shahdadi | Energy-Efficient Dynamic Source Routing
in Ad-Hoc Wireless Networks |
3:30 | Matt Jacobs, Matt Craighead,
William Blackwell II | |
4:00 | Justin Lin, Arjun
Narayanaswamy, Samitha Samaranayake | |
4:50 | Arnob Bhattacharyya, Bilal
Kaleem, Prasad Ramanan | |
5:00 | Ali Ibrahim, Alton Jerome
McFarland | |
5:30 | Hiro Iwashima, Mark Pipes, Eric
Cholankereil | |