Keeping Viruses Under Control

A unified approach to survivability of connection-oriented networks p. 3 SCTP based framework for mobile Web agent p. 13 An agent-based scheme for efficient multicast application in mobile networks p. 23 An enhanced one way function tree Rekey protocol based on Chinese remainder theoremp. 33 Admission control for multicast routing with quality of service in ad hoc networks p. 44 An efficient on-line job admission control scheme to guarantee deadlines for QoS-demanding applications p. 54 A methodology of resilient MPLS/VPN path management under multiple link failures p. 64 Comparison of hyper-DAG based task mapping and scheduling heuristics for wireless sensor networks p. 74 A Markov-based model to analyze the temporal evolution and lifetime of a sensor networkp. 84 Power-efficient seamless publishing and subscribing in wireless sensor networks p. 94 Group-oriented channel protection for mobile devices in digital multimedia broadcasting p. 103 IP traffic load distribution in NGEO broadband satellite networks p. 113 Cross-layer management of radio resources in an interactive DVB-RCS-based satellite network p. 124 Aggressive back off strategy in congestion management algorithm for DBS-RCS p. 136 TCP-peach++ : enhancement of TCP-peach+ for satellite IP networks with asymmetrical bandwidth and persistent fades p. 145 Automatic translation of serial to distributed code using CORBA event channels p. 152 Fault tolerant and robust mutual exclusion protocol for synchronous distributed systems p. 162 Exact best-case end-to-end response time analysis for hard real-time distributed systems p. 173 A formal policy specification language for an 802.11 WLAN with enhanced security network p. 183 A generic policy-conflict handling model p. 193 A truly random number generator based on a continuous-time chaotic oscillator for applications in cryptography p. 205 A new cryptanalytic time-memory trade-off for stream ciphers p. 215 SVM approach with a genetic algorithm for network intrusion detection p. 224 Modeling access control lists with discrete-time quasi birth-death processes p. 234 Stochastic bounds on partial ordering : application to memory overflows due to bursty arrivals p. 244 QoS evaluation method in multimedia applications using a fuzzy genetic rule-based system p. 254 Impact of setup message processing and optical switch configuration times on the performance of IP over optical burst switching networks p. 264 Characterizing Gnutella network properties for peer-to-peer network simulation p. 274 Computing communities in large networks using random walks p. 284