9:50 |
Rex Min and Piyada Phanaphat, |
Energy-Efficient Communication for Ad-hoc Microsensor Networks |
10:10 |
Mansim Connie Cheng, Kenneth Yu |
Port Agility - a censorship-resilient wrapping protocol |
10:30 |
Napoleon Nelson, Gautam Jayaraman |
Chord-based Membership and Lookup for Application-Level Multicast |
10:50 |
Gary Look, Rattapoom (Pipe) Tuchinda |
Using INS to support a multi-agent software system |
11:10 |
Philippe Cheng, Tina Wang |
Beacon Autoconfiguration in Cricket |
11:30 |
John Gu, David Bailey |
Robustness of Chord |
11:50 |
Peter Portante, Ed Suh, Jason Dettbarn |
Bandwidth Allocation in the Congestion Manager |
1:00 |
Paul Tasillo |
Asymmetric Routing in the Internet |
1:20 |
Dimitris Vyzovitis, Junius Ho, Angus Huang |
Self-Stabilizing Behavior of Peer-To-Peer Lookup Algorithms |
1:40 |
Noshirwan Petigara, Delfine Nain |
Using Node Mobility and Storage to Improve Connectivity in Mobile Ad Hoc Networks |
2:00 |
Timo Burkard |
A distributed peer-to-peer web crawler |
2:20 |
Terrence Poon, Marco Escobedo |
Evaluating TFRC as Congestion Control for Streaming Video |
3:00 |
Haiyang Liu, Ji Li |
Improving Scalable Packet Classification by Aggregating and Folding |
3:30 |
Indraneel Chakraborty, George Lee, Ben Leong |
Wireless Service Selection for the ANA Personal Router |
3:50 |
Frank Dabek, Josh Cates |
Congestion Control for Widely Distributed Striped Data |
4:10 |
Iris Baron, Jacob Strauss |
Relations between Packet Bunches and Available Bandwidth |
4:30 |
Matthew Lepinski and Hanson Zhou |
Improved Fault Tolerance in a Content-Addressable Network |
4:50 |
Neil Chungfat, Raffi Krikorian |
Simulation of a Zero Configuration Network Protocol |
5:10 |
Rich Moy, Sanjay Raman |
Distributed and Load-Balanced Routing in Wireless Ad-Hoc Networks |
9:30 |
Kalpak Kothari and Nikolaos Michalakis |
An Efficient Late-binding Mechanism in Twine |
9:50 |
Russ Cox and Athicha Muthitacharoen |
Serving DNS using a Peer to Peer Lookup Service |
10:30 |
Todd Nightingale, Stan Rost |
Multipath Routing in Simulated RONs |
10:50 |
Min Wu, Omar Bakr |
Peer-to-Peer DNS infrastructure againt DoS attacks |
11:10 |
Brendan Kao, Nii Latrey Dodoo |
iMPTCP: A Multipath Routing Protocol |
11:30 |
Michael Artz, Jon Salz |
Transparent Extensible Session-Layer Architecture |
11:50 |
Hu Imm Lee |
Routing Around Malicious Nodes in Ad Hoc Wireless Networks |
1:00 |
Aaron Beals, Matthew Hausmann |
A Packet-Pooling Mechanism for Improving Throughput |
1:20 |
Mingyang Xu, Yi Zhang |
An Agile Protocol for Censor-Resistant Networks |
1:40 |
Ronny Krashinsky |
Saving Energy while Maintaining Performance on Wireless LANs |
2:00 |
Rodrigo Rodrigues, Pedro Ferreira |
Using Traceroute Servers to Characterize Traffic Behavior in the Internet |
2:20 |
David West |
Implementation Issues of 8-bit TCP/IP Stacks on the Z80 based TI-86 |
2:40 |
Elie Krevat, Arian Shahdadi |
Energy-Efficient Dynamic Source Routing in Ad-Hoc Wireless Networks |
3:30 |
Matt Jacobs, Matt Craighead, William Blackwell II |
|
4:00 |
Justin Lin, Arjun Narayanaswamy, Samitha Samaranayake |
|
4:50 |
Arnob Bhattacharyya, Bilal Kaleem, Prasad Ramanan |
|
5:00 |
Ali Ibrahim, Alton Jerome McFarland |
|
5:30 |
Hiro Iwashima, Mark Pipes, Eric Cholankereil |
|